首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
SPARQL for a Web of Linked Data: Semantics and Computability (Extended Version)
Olaf Hartig
Universal Meshes: A new paradigm for computing with nonconforming triangulations
Ramsharan Rangarajan
,
Adrian J. Lew
A Bayesian Approach to Discovering Truth from Conflicting Sources for Data Integration
Bo Zhao
,
Benjamin I. P. Rubinstein
,
Jim Gemmell
,
Jiawei Han
A toolkit to describe and interactively display three-manifolds embedded in four-space
Don V. Black
How to Price Shared Optimizations in the Cloud
Prasang Upadhyaya
,
Magdalena Balazinska
,
Dan Suciu
Graph partitioning advance clustering technique
T Soni Madhulatha
Rigorous computer analysis of the Chow-Robbins game
Olle H?ggstr?m
,
Johan W?stlund
Towards a Unified Architecture for in-RDBMS Analytics
Xixuan Feng
,
Arun Kumar
,
Ben Recht
,
Christopher Ré
Outlier detection from ETL Execution trace
Saptarsi Goswami
,
Samiran Ghosh
,
Amlan Chakrabarti
Overview of streaming-data algorithms
T Soni Madhulatha
BlinkDB: Queries with Bounded Errors and Bounded Response Times on Very Large Data
Sameer Agarwal
,
Aurojit Panda
,
Barzan Mozafari
,
Samuel Madden
,
Ion Stoica
Stochastic Database Cracking: Towards Robust Adaptive Indexing in Main-Memory Column-Stores
Felix Halim
,
Stratos Idreos
,
Panagiotis Karras
,
Roland H. C. Yap
SharedDB: Killing One Thousand Queries With One Stone
Georgios Giannikis
,
Gustavo Alonso
,
Donald Kossmann
An Analysis of Structured Data on the Web
Nilesh Dalvi
,
Ashwin Machanavajjhala
,
Bo Pang
Towards Optimal Degree-distributions for Left-perfect Matchings in Random Bipartite Graphs
Martin Dietzfelbinger
,
Michael Rink
Majority and Plurality Problems
Dániel Gerbner
,
Gyula O. H. Katona
,
D?m?t?r Pálv?lgyi
,
Balázs Patkós
Flow-based reputation: more than just ranking
Antonino Simone
,
Boris Skoric
,
Nicola Zannone
A Survey of Smart Data Pricing: Past Proposals, Current Plans, and Future Trends
Soumya Sen
,
Carlee Joe-Wong
,
Sangtae Ha
,
Mung Chiang
What is the least number of moves needed to solve the 4-peg Towers of Hanoi problem?
Roberto Demontis
Parallelizing Mizar
Josef Urban
An efficient algorithm for generating AoA networks
Nasser Eddine Mouhoub
,
Abdelhamid Benhocine
Soundness of Unravelings for Conditional Term Rewriting Systems via Ultra-Properties Related to Linearity
Naoki Nishida
,
Masahiko Sakai
,
Toshiki Sakabe
From edge-disjoint paths to independent paths
Serge Gaspers
The Maximum Degree-and-Diameter-Bounded Subgraph in the Mesh
Mirka Miller
,
Hebert Perez-Roses
,
Joe Ryan
Universal Cycles for Weak Orders
Victoria Horan
,
Glenn Hurlbert
Arc-Disjoint Paths and Trees in 2-Regular Digraphs
J?rgen Bang-Jensen
,
Sven Simonsen
Vertex Splitting and Upper Embeddable Graphs
Guanghua Dong
,
Ning Wang
,
Yuanqiu Huang
,
Han Ren
,
Yanpei Liu
Target set selection problem for honeycomb networks
Chun-Ying Chiang
,
Liang-Hao Huang
,
Hong-Gwa Yeh
A Finite Population Model of Molecular Evolution: Theory and Computation
Narendra M. Dixit
,
Piyush Srivastava
,
Nisheeth K. Vishnoi
Applications of topology in computer algorithms
Rastislav Telgarsky
A Pseudo Random Number Generator from Chaos
Nabarun Mondal
,
Partha P. Ghosh
Design and Implementation of Distributed Resource Management Mechanisms for Wireless Mesh Networks
George Athanasiou
,
Leandros Tassiulas
On Shift Spaces with Algebraic Structure
Ville Salo
,
Ilkka T?rm?
Solving the LPN problem in cube-root time
Urs Wagner
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
Mohammad Zabihi
,
Ramin Shaghaghi
,
Mohammad Esmail kalantari
An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
Jaydip Sen
,
Subhamoy Maitra
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing
Wajeb Gharibi
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
Jesus Diaz
,
David Arroyo
,
Francisco B. Rodriguez
Building Custom Term Suggestion Web Services with OAI-Harvested Open Data
Philipp Schaer
,
Thomas Lüke
,
Wilko van Hoek
Symbian `vulnerability' and Mobile Threats
Wajeb Gharibi
Multidisciplinary Cognitive Content of Nanoscience and Nanotechnology
Sta?a Milojevi?
DREAM: DiffeRentially privatE smArt Metering
Gergely Acs
,
Claude Castelluccia
On the Hamming Distance between base-n representations of whole numbers
Anunay Kulshrestha
Fast, parallel and secure cryptography algorithm using Lorenz's attractor
Anderson Gon?alves Marco
,
Alexandre Souto Martinez
,
Odemir Martinez Bruno
Fully Analyzing an Algebraic Polya Urn Model
Basile Morcrette
An improved bound on acyclic chromatic index of planar graphs
Yue Guan
,
Jianfeng Hou
,
Yingyuan Yang
Distributed Denial of Service (DDoS) Attacks Detection Mechanism
Saravanan Kumarasamy
,
R. Asokan
Coteries, Social Circles and Hamlets Close Communities: A Study of Acquaintance Networks
Robert J. Mokken
Reflection Scan: an Off-Path Attack on TCP
Jan Wrobel
Online Mixed Packing and Covering
Umang Bhaskar
,
Lisa Fleischer
Go