首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
Verdict Accuracy of Quick Reduct Algorithm using Clustering and Classification Techniques for Gene Expression Data
T. Chandrasekhar
,
K. Thangavel
,
E. N. Sathishkumar
Stopping Criterion for the Mean Shift Iterative Algorithm
Yasel Garcés Suárez
,
Esley Torres
,
Osvaldo Pereira
,
Claudia Pérez
,
Roberto Rogríguez
Sparse Representation-based Image Quality Assessment
Tanaya Guha
,
Ehsan Nezhadarya
,
Rabab K Ward
Learning to encode motion using spatio-temporal synchrony
Kishore Reddy Konda
,
Roland Memisevic
,
Vincent Michalski
Non-parametric Power-law Data Clustering
Xuhui Fan
,
Yiling Zeng
,
Longbing Cao
A new DNA alignment method based on inverted index
Wang Liang
,
Zhao KaiYong
Scheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results
Natashia Boland
,
Thomas Kalinowski
,
Reena Kapoor
,
Simranjit Kaur
Matching with our Eyes Closed
Gagan Goel
,
Pushkar Tripathi
Reinforcement learning with restrictions on the action set
Mario Bravo
,
Mathieu Faure
Query Complexity of Correlated Equilibrium
Yakov Babichenko
,
Siddharth Barman
Privacy and Mechanism Design
Mallesh Pai
,
Aaron Roth
Solving Parity Games on Integer Vectors
Parosh Aziz Abdulla
,
Richard Mayr
,
Arnaud Sangnier
,
Jeremy Sproston
Sharing a Reward Based on Peer Evaluations
Arthur Carvalho
,
Kate Larson
Rational series and asymptotic expansion for linear homogeneous divide-and-conquer recurrences
Philippe Dumas
The Worst Case Number of Questions in Generalized AB Game with and without White-peg Answers
Gerold J?ger
,
Marcin Peczarski
On Primitivity of Sets of Matrices
Vincent D. Blondel
,
Raphael M. Jungers
,
Alex Olshevsky
Pseudorandomness for Regular Branching Programs via Fourier Analysis
Omer Reingold
,
Thomas Steinke
,
Salil Vadhan
Copula-based Randomized Mechanisms for Truthful Scheduling on Two Unrelated Machines
Xujin Chen
,
Donglei Du
,
Luis F. Zuluaga
Network bargaining with general capacities
Linda Farczadi
,
Konstantinos Georgiou
,
Jochen Koenemann
Estimating the distance from testable affine-invariant properties
Hamed Hatami
,
Shachar Lovett
On the Semi-Markov Equivalence of Causal Models
Benoit Desjardins
Inferring Informational Goals from Free-Text Queries: A Bayesian Approach
David Heckerman
,
Eric J. Horvitz
Measure Selection: Notions of Rationality and Representation Independence
Manfred Jaeger
The Bayesian Structural EM Algorithm
Nir Friedman
Psychological and Normative Theories of Causal Power and the Probabilities of Causes
Clark Glymour
ChaMAILeon: Simplified email sharing like never before!
Prateek Dewan
,
Mayank Gupta
,
Ponnurangam Kumaraguru
Pebbling, Entropy and Branching Program Size Lower Bounds
Balagopal Komarath
,
Jayalal Sarma M. N
Not all paths lead to Rome: Analysing the network of sister cities
Andreas Kaltenbrunner
,
Pablo Aragón
,
David Laniado
,
Yana Volkovich
Introduction of Intellectual Property Courses in STEM Curriculum
Madhur Srivastava
Chatty Mobiles:Individual mobility and communication patterns
Thomas Couronne
,
Zbigniew Smoreda
,
Ana-Maria Olteanu
Science 3.0: Corrections to the Science 2.0 paradigm
Vladimir B. Teif
Exploring the needs of Malay manuscript studies community for an e-learning platform
Z. Zahidah
,
A. Noorhidawati
,
A. N. Zainab
On the Complexity of Connectivity in Cognitive Radio Networks Through Spectrum Assignment
Hongyu Liang
,
Tiancheng Lou
,
Haisheng Tan
,
Yuexuan Wang
,
Dongxiao Yu
Tree-based Arithmetic and Compressed Representations of Giant Numbers
Paul Tarau
2D Lyndon Words and Applications
Shoshana Marcus
,
Dina Sokol
On Randomized Memoryless Algorithms for the Weighted $k$-server Problem
Ashish Chiplunkar
,
Sundar Vishwanathan
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
Haiyan Sun
,
Qiaoyan Wen
,
Hua Zhang
,
Zhengping Jin
,
Wenmin Li
Secrecy without one-way functions
Dima Grigoriev
,
Vladimir Shpilrain
General method for the security analysis in a quantum direct communication protocol
Jaros?aw Adam Miszczak
,
Piotr Zawadzki
Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
Mohsen Bahrami
,
Ali Bereyhi
,
Mahtab Mirmohseni
,
Mohammad Reza Aref
Composable security of delegated quantum computation
Vedran Dunjko
,
Joseph F. Fitzsimons
,
Christopher Portmann
,
Renato Renner
SkyDe: a Skype-based Steganographic Method
Wojciech Mazurczyk
,
Maciej Karas
,
Krzysztof Szczypiorski
Practical Bijective S-box Design
Abdurashid Mamadolimov
,
Herman Isa
,
Moesfa Soeheila Mohamad
A real-time QKD system based on FPGA
Hong-fei Zhang
,
Jian Wang
,
Ke Cui
,
Chun-li Luo
,
Sheng-zhao Lin
,
Lei Zhou
,
Hao Liang
,
Teng-yun Chen
,
Kai Chen
,
Jian-wei Pan
Constraint Expressions and Workflow Satisfiability
Jason Crampton
,
Gregory Gutin
Bicategorical Semantics for Nondeterministic Computation
Mike Stay
,
Jamie Vicary
On the Product of Small Elkies Primes
Igor Shparlinski
Cloud Penetration Testing
Ralph LaBarge
,
Thomas McGuire
New digital signature protocol based on elliptic curves
Ounasser Abid
,
Jaouad Ettanfouhi
,
Omar Khadir
Design, Implementation, and Operation of a Mobile Honeypot
Matthias W?hlisch
,
André Vorbach
,
Christian Keil
,
Jochen Sch?nfelder
,
Thomas C. Schmidt
,
Jochen H. Schiller
Go