Category:Computer Science
Jump to navigation
Jump to search
Pages in category "Computer Science"
The following 200 pages are in this category, out of 1,200 total.
(previous page) (next page)1
- 1223Evidential Force Aggregation
- 1A Computational Economy for Grid Computing
- 1A Deadline and Budget Constrained Cost -Time Optimisation
- 1A Vector Representation of 3D Rotations
- 1An Exploratory Study of Mobile Computing Use by Knowledge Workers
- 1Catholic University of Louvain, Department of Mathematica l Engineering,
- 1Secure Transmission of Sensitive data using multiple channels
- 1Shooting Over or Under the Mark: Towards a Reliable and Flexible Anticipation in the Economy
- 1Steady State Resource Allocation Analysis for Stochastic Diffusion Search
- 1Universiteit van Amsterdam
2
4
A
- A Backward Analysis for Constraint Logic Programs
- A Beautiful and Relatively Old Algorithm for Surface Reconstruction
- A Brief Overview of the Research
- A Comparison of Cryptography Courses
- A Concurrent Fuzzy-Neural Network Approach for Decision Support Systems
- A Correlation-Based Distance Metric for Data Points
- A Digital Version of Green's Theorem for Formal Verification
- A Dualheap: A Novel Algorithm for Efficient Selection and Sorting
- A Fast and Practical Algorithm for Selection Problems
- A Fast Method for Sampling Real Algebraic Sets
- A Faster and More Unifying Algorithm for Comparing Trees
- A Few Useful Things to Know About Machine Learning
- A Formal Model of Pure Prolog Execution
- A Framework for Assessing Universal Service Obligations: A Developing Country
- A Framework for Compiling Preferences in Logic Programs
- A Framework for Datatype Transformation
- A Functional Programming Language for Quantum Computing with Classical Control
- A General Framework for Bounds for Higher-Dimensional Orthogonal Packing Problems
- A General Framework for Lazy Functional Logic Programming
- A General Review of Hash Functions in Cryptography
- A General-Purpose Language for Unpredictable Computation
- A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids
- A Hash Function Review
- A Logic-Based Approach to Data Integration
- A Mathematical Framework for Automated Bug Localization
- A Modular and Fault-Tolerant Data Transport Framework for High-Energy and Heavy-Ion Physics Experiments
- A Multi-Step Process for Generating Multi-Platform User Interfaces
- A Neural Network Assembly Memory Model Based on Optimal Binary Signal Detection Theory
- A Neuro-Fuzzy Approach for Modelling Electricity Demand in Victoria
- A New Approach to Formal Language Theory using Kolmogorov Complexity
- A New Approach to Standardized Testing in Higher Education
- A New Approach to the 3-Sat Problem
- A New Approach to Visualizing Algebraic Curves in Parallel Coordinates
- A New Computational Framework for 2D Shape-Enclosing Contour Extraction
- A New Computational Framework For 2D Shape-Enclosing Contours
- A New Three-Stage Computer Artificial Neural Network Model of the Tip-of-the-Tongue Phenomenon
- A Note on Power-Laws of Internet Topology
- A Novel Approach to Structure from Motion Using Custom-Built Lie Group Actions
- A Novel Representation of 3D Rotations: The Gibbs-Rodrigues Representation
- A Parameterised Hierarchy of Argumentation
- A Performance Analysis Tool for Nokia Mobile Phone Software
- A Perspective on the Healthgrid Initiative
- A Preliminary Study for the Development of an Early Method for the Measurement of Software Product Function Points
- A Probabilistic Model of Machine Translation
- A Quick Look at Serial ATA (SATA) Disk Performance
- A Rigorous Definition of Axial Lines: Ridges on Isovist Fields
- A Service-Based Approach for Managing Mammography Data
- A Simple Corporate Tax System That Doesn't Distort Incentives
- A Situation Calculus-based Approach to Model Ubiquitous Applications
- A Situation Calculus-based Approach to Model Ubiquitous Information Services
- A Steady State Model for Graph Power Laws
- A Straightforward Approach to Morphological Analysis and Synthesis
- A Summary of the Research
- A Summary of the Research Article "Article Title"
- A Theory of Experiment
- A Tight Upper Bound on the Number of Candidate Patterns in Frequent Pattern Mining
- A Treatment of Higher-Order Features in Logic Programming
- A Universal Model for Paraphrasing
- A Use-Case Driven Approach to Requirements Engineering: The MammoGrid Project
- A Virtual Java Simulation Lab for Computer Science Students
- A1 a2u1
- AADEBUG 2000 MAD Debugging Activities
- Abduction in Well-Founded Semantics and Generalized Stable Models via Tabled Dual Programs
- Abduction with Penalization in Logic Programming
- Abductive Logic Programs with Penalization: Semantics, Complexity, and Implementation
- ABL: An Unsupervised Learning Algorithm for Structured Language
- Abstract
- Abstract. To protect sensitive information in a cross tabulated table , it is a common practice
- Abstractions
- Accurately modeling the Internet topology
- Accurately Modeling the Internet Topology: Introduction of the Positive-Feedback Preference (PFP) Model
- Ackermann Encoding, Bisimulations, and OBDDs
- ActiveQueue Management Techniques for Fair and Efficient Token Distribution in Diffserv Networks
- Adaptable Arithmetic: A New Approach to Numerical Computations
- Adaptation in Internet Applications
- Adaptation of Mamdani Fuzzy Inference System Using Neuro-Genetic Approach for Tactical Air Combat Decision Support System
- Adding Unwitting Web Browsersto Anonymity Sets
- Adi Shamir's Research on Guaranteeing the Diversity of Number Generators
- Against Distributed Denial-of-Service Attacks
- Agostino Dovier
- Alberto Pettorossi
- Alchemi: A .NET-based Grid Computing Framework and its Integration into Global Grids
- Alexandre Tessier
- Alexsander Vardy
- Algorithmic Probability and Sequential Decision Theory
- Algorithmic Randomness: A General Framework
- Algorithms for Estimating Information Distance
- An Alternating Algorithm for Mining Redescriptions
- An application of ABF Neural Network
- An Assessment of the Consistency for Software Measurement Methods
- An Asynchronous Automata Approach to the Semantics of Temporal Logic
- An Effective Procedure for Speeding Up Algorithms
- An Empirical Model for Volatility of Returns and Option Pricing
- An Environment for Non Monotonic Logic Programs
- An Information Theory for Preferences
- An Integrated Approach for Extraction of Objects from XML and Transformation to Heterogeneous Object-Oriented Databases
- An Integrated Documentation Environment for Constraint Logic Programming
- An Interesting Property in Iterated Revisions
- An Overview of Computer Security
- Analysis of Hybrid Soft and Hard Computing Techniques for Forex Monitoring Systems
- Analysis of Implementation of HIEROCRYPT–3 Algorithm and Comparison to CAMELLIA Algorithm
- Analytical Solution of Transient Scalar Wave and Diffusion Problems using RBF Wavelet Series
- Analyzing ENUM Service and Administration from the Bottom Up
- Analyzing Website Choice Using Clickstream Data
- Anaphora and Discourse Structure
- And countermeasures for enhancement of their overall performances
- And Its Application to Numerical Constraint Satisfaction Problems
- And technological change: a model for the
- AndAsianLanguage Resources
- Annotated Revision Programs: A Study on the Consistency of Belief Updates
- Annotation Graph Toolkit: A Comprehensive Framework for Annotation-Based Language Technologies
- Annotation Graphs and Servers and Multi-Modal Resources
- Antitonic Representations for Nonmonotonic Inference Operations
- Anusaaraka: An Information-Based Approach to Machine Translation
- AParticular BugTrap: Execution Replay Using Virtual Machines
- Application Architecture for Spoken Language Resources in Organisational Settings
- Application of Kullback -Leibler Metric to Speech Recognition
- Approach
- Approximate Palindromes in Strings
- Approximate Quantifiers for Solving First-Order Constraints
- Architectural Framework for Large-Scale Multicast in Mobile Ad Hoc Networks
- Are All Convex Polyhedra Castable?
- ARRAYS: A New Encryption Scheme
- Artificial Neural Networks for Beginners
- As a Fault Recovery Method in Analog Systems
- Assessing the Effectiveness of Section 271 Five Years After the Telecommunications Act of 1996
- Assessing the Effectiveness of Section 271 of the Telecommunications Act of 1996
- Assigning Satisfaction Values to Constraints: A Summary of the Research
- Association Rule Mining
- Astrophysical Data Mining: A Review of Multidimensional Indexing and Data Warehousing Techniques
- Asynchronous Automata: A Model for Asynchronous Circuits
- ATLAS Control System Relational Databases
- August 3, 1999
- Automata with Memory: A New Approach for Secret Sharing of Color Images
- Automated Classification of Web Sites
- Automated Debugging for Beginner Programmers
- Automated Debugging for Parallel Programs
- Automated Debugging in Java Using OCL and JDI
- Automated Debugging with Position-Based Execution Control
- Automated Error Correction for Concurrent Logic Programs
- Automated Fault Localization Using Potential Invariants
- Automated Mapping of Scholarly Domains: A Case Study on the arXiv Repository
- Automated Real-Time Testing for Embedded Control Systems
- Automated Resolution of Noisy Bibliographic References
- Automated Software Testing and Debugging with Event-Based Program Behavior Models
- Automatic Debugging and Program Visualization with UFO: A New Monitoring Language for Run Time and Post-Mortem Behavior Analysis and Visualization
- Automatic Generation of Indicative Multidocument Summaries
- Automatic Generation of Indicative Summaries for Multiple Documents
- Automatic Termination Analysis for Logic Programs
- Automatic Termination Inference for Numerical Loops in Prolog
- AvailabilityGuaranteefor
- Average Case Complexity of Graph Coloring Problems
- Average Case NP-Complete Graph Coloring Problem
- Average-Case Analysis of Random 3-SAT Instances with Backtrack Algorithms
- Axioms Polynomially Simulate Nullstellensatz
B
- Bandwidth Reservations on the Internet
- Basque Word Sense Disambiguation: Did Systems Perform in the Upperbound?
- Bayesian Logic Programs
- Bayesian Optimization Algorithm: A Promising Approach for Fitness Inheritance
- Beijing University of Aeronautics and Astronautics
- Belief Revision: A Critique
- Bell Laboratories
- Benny Lehmann
- Between Polygons and Polytopes
- Biconnectivity in Linear Time
- Bidding Clubs in First-Price Auctions
- Bigger May Not Be Better: An Empirical Analysis of Optimal Membership Rules in Peer-to-Peer Networks
- Binary Reachability Characterization for Pushdown Timed Automata
- Binding Schema Markup Language (BSML) for Data Interchange in Scientific Problem Solving Environments
- Biodiversity Database System (BODHI)
- Bipartite Graph Partitioning for Data Clustering
- BIRDS-I: A Benchmark for Image Retrieval Using Distributed Systems over the Internet
- BLIND NORMALIZATION OF SPEECH FROM DIFFERENT CHANNELS AND SPEAKERS
- Boolean Polynomial Value Comparison
- BORIS ALEXEEV
- Bound on the Number of Geometric Permutations for Congruent Balls
- Bounded Broadcast
- Branch and Bound Heuristics for Multi-Unit Combinatorial Auctions
- Branching: The Essence of Constraint Solving
- Bringing the Internet to Schools: US and EU Policies
- Broadcast
- Building a Parallel Computer Using Cheap PCs
- Building a Test Collection for Speech-Driven Web Retrieval
- Building Multi-Platform User Interfaces with UIML
- Built from Rectangles
- Bump in the Night: How Benchmarking Can Go Flat with Too Much Java Juice!
- Bundling Equilibrium in Combinatorial Auctions