首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
Numerical Methods for Solving Convection-Diffusion Problems
A. Churbanov
,
P. Vabishchevich
Upgrading EasyTime: from a textual to a visual language
Iztok Fister Jr.
,
Toma? Kosar
,
Marjan Mernik
,
Iztok Fister
Checking Robustness against TSO
Ahmed Bouajjani
,
Egor Derevenetc
,
Roland Meyer
A New Family of Generalized 3D Cat Maps
Yue Wu
,
Sos Agaian
,
Joseph P. Noonan
The Hush Cryptosystem
Sari Haj Hussein
Eavesdropping in Semiquantum Key Distribution Protocol
Arpita Maitra
,
Goutam Paul
A Factoring and Discrete Logarithm based Cryptosystem
Abdoul Aziz Ciss
,
Ahmed Youssef Ould Cheikh
,
Djiby Sow
Electronic-government in Saudi Arabia: A positive revolution in the peninsula
Omar S. Al-Mushayt
,
Yusuf Perwej
,
Kashiful Haq
Interactive Learning through Hands-on Practice using Electronic Mini - Lab (EML): a Case Study
Vikas J Dongre
,
Ramkrishna V Yenkar
,
Vijay H Mankar
Ontology-oriented e-gov services retrieval
Hassania Ouchetto
,
Ouail Ouchetto
,
Ounsa Roudies
Current practice in software development for computational neuroscience and how to improve it
Marc-Oliver Gewaltig
,
Robert Cannon
How Visibility and Divided Attention Constrain Social Contagion
Nathan Oken Hodas
,
Kristina Lerman
Quantifying the Strategyproofness of Mechanisms via Metrics on Payoff Distributions
Benjamin Lubin
,
David C. Parkes
Censored Exploration and the Dark Pool Problem
Kuzman Ganchev
,
Michael Kearns
,
Yuriy Nevmyvaka
,
Jennifer Wortman Vaughan
Matching with Commitments
Kevin Costello
,
Prasad Tetali
,
Pushkar Tripathi
QIRAL: A High Level Language for Lattice QCD Code Generation
Denis Barthou
,
Gilbert Grosdidier
,
Michael Kruse
,
Olivier Pène
,
Claude Tadonki
On conditions for ρ-value is 1 or not of complete family of pairing-friendly elliptic curves
Keiji Okano
Two for the Price of One: Lifting Separation Logic Assertions
Jacob Thamsborg
,
Lars Birkedal
,
Hongseok Yang
`CodeAliker' - Plagiarism Detection on the Cloud
Nitish Upreti
Adding Methodological Testing to Naur's Anti-formalism
S. J. Meyer
Anonymous Card Shuffling and its Applications to Parallel Mixnets
Michael T. Goodrich
,
Michael Mitzenmacher
Design For Change: Information-Centric Architecture to Support Agile Disaster Response
Yan Shvartzshnaider
,
Maximilian Ott
Personal Safety Triggering System on Android Mobile Platform
Ashokkumar Ramalingam
,
Prabhu Dorairaj
,
Saranya Ramamoorthy
Compressed Sensing based Protocol for Efficient Reconstruction of Sparse Superimposed Data in a Multi-Hop Wireless Sensor Network
Megumi Kaneko
,
Khaldoun Al Agha
Efficient Touch Based Localization through Submodularity
Shervin Javdani
,
Matthew Klingensmith
,
J. Andrew Bagnell
,
Nancy S. Pollard
,
Siddhartha S. Srinivasa
Fragmentation Considered Poisonous
Amir Herzberg
,
Haya Shulman
SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted
Somdip Dey
Minimax Linear Quadratic Gaussian Control of Nonlinear MIMO System with Time Varying Uncertainties
Obaid Ur Rehman
,
Ian R. Petersen
,
Bar?? Fidan
A CCA2 Secure Variant of the McEliece Cryptosystem
Nico D?ttling
,
Rafael Dowsley
,
J?rn Müller-Quade
,
Anderson C. A. Nascimento
Decision Taking for Selling Thread Startup
Jan A. Bergstra
Influence Maximization in Continuous Time Diffusion Networks
Manuel Gomez Rodriguez
,
Bernhard Sch?lkopf
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow
J. K. Mandal
,
Debashis Das
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
Preeti Sharma
,
Monika Saluja
,
Krishan Kumar Saluja
Vortexje - An Open-Source Panel Method for Co-Simulation
Jorn H. Baayen
SD-EQR: A New Technique To Use QR CodesTM in Cryptography
Somdip Dey
On the Efficiency of Classical and Quantum Secure Function Evaluation
Severin Winkler
,
Jürg Wullschleger
Level Set Estimation from Compressive Measurements using Box Constrained Total Variation Regularization
Akshay Soni
,
Jarvis Haupt
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android
Alexandre Bartel
,
Jacques Klein
,
Martin Monperrus
,
Yves Le Traon
Adaptive fast multipole methods on the GPU
Anders Goude
,
Stefan Engblom
SubGraD- An Approach for Subgraph Detection
Akshara Pande
,
Vivekanand Pant
,
S. Nigam
Pebble Motion on Graphs with Rotations: Efficient Feasibility Tests and Planning Algorithms
Jingjin Yu
,
Daniela Rus
Randomized Extended Kaczmarz for Solving Least-Squares
Anastasios Zouzias
,
Nikolaos Freris
An n log n Alogrithm for Deterministic Kripke Structure Minimization
Karl Meinke
,
Muddassar A. Sindhu
Strong Conflict-Free Coloring of Intervals
Luisa Gargano
,
Adele A. Rescigno
Distributed Algorithms for Scheduling on Line and Tree Networks
Venkatesan T. Chakaravarthy
,
Sambuddha Roy
,
Yogish Sabharwal
On Min-Power Steiner Tree
Fabrizio Grandoni
Minimal TestCase Generation for Object-Oriented Software with State Charts
Ranjita Kumari Swain
,
Prafulla Kumar Behera
,
Durga Prasad Mohapatra
Navigation domain representation for interactive multiview imaging
Thomas Maugey
,
Ismael Daribo
,
Gene Cheung
,
Pascal Frossard
Nested Dictionary Learning for Hierarchical Organization of Imagery and Text
Lingbo Li
,
XianXing Zhang
,
Mingyuan Zhou
,
Lawrence Carin
Image Processing using Smooth Ordering of its Patches
Idan Ram
,
Michael Elad
,
Israel Cohen
Go