首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
Analysis of access in the Take-Grant model
Denis Brechka
Thermal analysis & optimization of a 3 dimensional heterogeneous structure
Ramya Menon C.
,
Vinod Pangracious
Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information
Zhiping Jiang
,
Jizhong Zhao
,
Xiang-Yang Li
,
JinSong Han
,
Wei Xi
Credal Classification based on AODE and compression coefficients
Giorgio Corani
,
Alessandro Antonucci
Spectral dimensionality reduction for HMMs
Dean P. Foster
,
Jordan Rodu
,
Lyle H. Ungar
Application of Gist SVM in Cancer Detection
S. Aruna
,
S. P. Rajagopalan
,
L. V. Nandakishore
A Bayesian Model Committee Approach to Forecasting Global Solar Radiation
Philippe Lauret
,
Auline Rodler
,
Marc Muselli
,
Mathieu David
,
Hadja Diagne
,
Cyril Voyant
Parallel Matrix Factorization for Binary Response
Rajiv Khanna
,
Liang Zhang
,
Deepak Agarwal
,
Beechung Chen
Recommender systems in industrial contexts
Frank Meyer
Speeding up the binary Gaussian process classification
Jarno Vanhatalo
,
Aki Vehtari
Data Mining: A Prediction for Performance Improvement of Engineering Students using Classification
Surjeet Kumar Yadav
,
Saurabh Pal
Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices
radeep B. H
,
Sanjay Singh
An Enciphering Scheme Based on a Card Shuffle
Viet Tung Hoang
,
Ben Morris
,
Phillip Rogaway
Securing Speech in GSM Networks using DES with Random Permutation and Inversion Algorithm
Khaled Merit
,
Abdelazziz Ouamri
Constant Ciphertext Length in CP-ABE
Nishant Doshi
,
Devesh Jinwala
Updating attribute in CP-ABE: A New Approach
Nishant Doshi
,
Devesh Jinwala
Sequence Randomization Using Convolutional Codes and Probability Functions
Vaignana Spoorthy Ella
On Bringer-Chabanne EPIR Protocol for Polynomial Evaluation
Yeow Meng Chee
,
Huaxiong Wang
,
Liang Feng Zhang
A Brief Summary of Dictionary Learning Based Approach for Classification (revised)
Shu Kong
,
Donghui Wang
On Multisequences and their extensions
Srinivasan Krishnaswamy
,
Harish K. Pillai
Efficient Private Distributed Computation on Unbounded Input Streams
Shlomi Dolev
,
Juan Garay
,
Niv Gilboa
,
Vladimir Kolesnikov
,
Yelena Yuditsky
A Novel Overlay IDS For Wireless Sensor Networks
Sumanta Saha
,
Md. Safiqul Islam
,
Md. Sakhawat Hossen
,
Mohammad Saiful Islam Mamun
The Chief Security Officer Problem
Kamesh Namuduri
,
Li Li
,
Mahadevan Gomathisankaran
,
Murali Varanasi
Towards Energy-Efficient Database Cluster Design
Willis Lang
,
Stavros Harizopoulos
,
Jignesh M. Patel
,
Mehul A. Shah
,
Dimitris Tsirogiannis
Digging Deeper into Deep Web Databases by Breaking Through the Top-k Barrier
Saravanan Thirumuruganathan
,
Nan Zhang
,
Gautam Das
The MADlib Analytics Library or MAD Skills, the SQL
Joe Hellerstein
,
Christopher Ré
,
Florian Schoppmann
,
Daisy Zhe Wang
,
Eugene Fratkin
,
Aleksander Gorajek
,
Kee Siong Ng
,
Caleb Welton
,
Xixuan Feng
,
Kun Li
,
Arun Kumar
Learning Expressive Linkage Rules using Genetic Programming
Robert Isele
,
Christian Bizer
CrowdER: Crowdsourcing Entity Resolution
Jiannan Wang
,
Tim Kraska
,
Michael J. Franklin
,
Jianhua Feng
Uncertain Time-Series Similarity: Return to the Basics
Michele Dallachiesa
,
Besmira Nushi
,
Katsiaryna Mirylenka
,
Themis Palpanas
Language Acquisition in Computers
Megan Belzner
,
Sean Colin-Ellerin
,
Jorge H. Roman
Rainbow Colouring of Split and Threshold Graphs
L. Sunil Chandran
,
Deepak Rajendraprasad
Effective Listings of Function Stop words for Twitter
Murphy Choy
Towards a Tool-based Development Methodology for Pervasive Computing Applications
Damien Cassou
,
Julien Bruneau
,
Charles Consel
,
Emilie Balland
On Global Types and Multi-Party Session
Giuseppe Castagna
,
Mariangiola Dezani-Ciancaglini
,
Luca Padovani
Region-based memory management for Mercury programs
Quan Phan
,
Gerda Janssens
,
Zoltan Somogyi
Generating nested quadrature formulas for general weight functions with known moments
Sanjay Mehrotra
,
Dávid Papp
Analyzing and enhancing OSKI for sparse matrix-vector multiplication
Kadir Akbudak
,
Enver Kayaaslan
,
Cevdet Aykanat
An Arithmetic and Geometric Mean Invariant
John Lindgren
,
Vibeke Libby
Revisiting the D-iteration method: from theoretical to practical computation cost
Dohy Hong
Manual and Fast C Code Optimization
Mohammed Fadle Abdulla
Bound Analysis of Imperative Programs with the Size-change Abstraction (extended version)
Florian Zuleger
,
Sumit Gulwani
,
Moritz Sinn
,
Helmut Veith
A Programmer-Centric Approach to Program Verification in ATS
Zhiqiang Ren
,
Hongwei Xi
The green grid saga - a green initiative to data centers: a review
Partha Pratim Ray
Naming and Counting in Anonymous Unknown Dynamic Networks
Othon Michail
,
Ioannis Chatzigiannakis
,
Paul G. Spirakis
Enumerating Subgraph Instances Using Map-Reduce
Foto N. Afrati
,
Dimitris Fotakis
,
Jeffrey D. Ullman
Block-Relaxation Methods for 3D Constant-Coefficient Stencils on GPUs and Multicore CPUs
Manuel Rodriguez Rodriguez
,
Bobby Philip
,
Zhen Wang
,
Mark Berrill
Scheduling Data Intensive Workloads through Virtualization on MapReduce based Clouds
B. Thirumala Rao
,
L. S. S. Reddy
A Semantic Without Syntax 1
Farzad Didehvar
An Open Question about Dependency of Life Time of Hardware Components and Dynamic Voltage Scaling
Nasrin Jaberi
ICT's role in e-Governance in India and Malaysia: A Review
Ganesh Ch Deka
,
Jasni Mohamad Zain
,
Prabhat Mahanti
Go