Skip to main content
Cornell University
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors. Donate
arxiv logo > cs

Help | Advanced Search

arXiv logo
Cornell University Logo

quick links

  • Login
  • Help Pages
  • About

Computer Science

Authors and titles for March 2010

Total of 624 entries : 1-50 ... 201-250 251-300 301-350 351-400 401-450 451-500 501-550 ... 601-624
Showing up to 50 entries per page: fewer | more | all
[351] arXiv:1003.3996 [pdf, other]
Title: DIP: Disruption-Tolerance for IP
Michael Neufeld
Subjects: Networking and Internet Architecture (cs.NI)
[352] arXiv:1003.4012 [pdf, other]
Title: Phase Synchronization in Railway Timetables
Christoph Fretter, Lachezar Krumov, Karsten Weihe, Matthias Müller-Hannemann, Marc-Thorsten Hütt
Journal-ref: European Physical Journal B, Volume 77, Number 2, 281-289 (2010)
Subjects: Data Structures and Algorithms (cs.DS); Optimization and Control (math.OC); Physics and Society (physics.soc-ph)
[353] arXiv:1003.4016 [pdf, other]
Title: Reconstruction of complete interval tournaments
Antal Iványi
Journal-ref: Acta Univ. Sapientiae, Informatica, 1, 1 (2009) 71-88
Subjects: Discrete Mathematics (cs.DM)
[354] arXiv:1003.4021 [pdf, other]
Title: System-theoretic approach to image interest point detection
Vitaly Pimenov
Comments: 12 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[355] arXiv:1003.4029 [pdf, other]
Title: On Extractors and Exposure-Resilient Functions for Sublogarithmic Entropy
Yakir Reshef, Salil Vadhan
Subjects: Computational Complexity (cs.CC)
[356] arXiv:1003.4036 [pdf, other]
Title: A Very Simple Approach for 3-D to 2-D Mapping
Sandipan Dey, Ajith Abraham, Sugata Sanyal
Comments: 7 Pages, 5 Figures,
Journal-ref: International Journal on Image Processing and Communications , Poland, Editor-in-Chief: R. S. Choras; Volume 11, No. 2, pp. 75 - 82, 2007.
Subjects: Graphics (cs.GR)
[357] arXiv:1003.4042 [pdf, other]
Title: MINRES-QLP: a Krylov subspace method for indefinite or singular symmetric systems
Sou-Cheng T. Choi, Christopher C. Paige, Michael A. Saunders
Comments: 26 pages, 6 figures
Journal-ref: SIAM Journal on Scientific Computing, Volume 33, Issue 4, 1810-1836, 2011
Subjects: Numerical Analysis (math.NA); Computational Engineering, Finance, and Science (cs.CE); Computation (stat.CO)
[358] arXiv:1003.4049 [pdf, other]
Title: An Optimal Prefix Replication Strategy for VoD Services
M Dakshayini, T R GopalaKrishnan Nair
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Multimedia (cs.MM)
[359] arXiv:1003.4053 [pdf, other]
Title: A Comprehensive Review of Image Enhancement Techniques
Raman Maini, Himanshu Aggarwal
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[360] arXiv:1003.4057 [pdf, other]
Title: Construction of optimal codes in deletion and insertion metric
Hyun Kwang Kim, Joon Yop Lee, Dong Yeol Oh
Comments: 20 pages, The material of this paper was presented in part at the 10th International Workshop on Algebraic and Combinatorial Coding Theory, Zvenigorod, Russia, September 2006
Subjects: Information Theory (cs.IT)
[361] arXiv:1003.4062 [pdf, other]
Title: A Rank Based Replacement Policy for Multimedia Server Cache Using Zipf-Like Law
T R Gopalakrishnan Nair, P Jayarekha
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Performance (cs.PF)
[362] arXiv:1003.4063 [pdf, other]
Title: Analysis of Supply Chain Network Using RFID Technique with Hybrid Algorithm
P Suresh, R Kesavan
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Networking and Internet Architecture (cs.NI)
[363] arXiv:1003.4064 [pdf, other]
Title: Measuring Bandwidth for Super Computer Workloads
A. Neela Madheswari, R. S. D. Wahida Banu
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Performance (cs.PF)
[364] arXiv:1003.4065 [pdf, other]
Title: Plagiarism Detection using ROUGE and WordNet
Chien-Ying Chen, Jen-Yuan Yeh, Hao-Ren Ke
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010
Subjects: Other Computer Science (cs.OH); Computation and Language (cs.CL)
[365] arXiv:1003.4066 [pdf, other]
Title: A Security Based Data Mining Approach in Data Grid
S. Vidhya, S. Karthikeyan
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Databases (cs.DB)
[366] arXiv:1003.4067 [pdf, other]
Title: Computation of Reducts Using Topology and Measure of Significance of Attributes
P. G. JansiRani, R. Bhaskaran
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Information Retrieval (cs.IR)
[367] arXiv:1003.4068 [pdf, other]
Title: A Novel Approach For Discovery Multi Level Fuzzy Association Rule Mining
Pratima Gautam, K. R. Pardasani
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Databases (cs.DB)
[368] arXiv:1003.4070 [pdf, other]
Title: Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols
Viral V. Kapadia, Sudarshan N. Patel, Rutvij H. Jhaveri
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Networking and Internet Architecture (cs.NI)
[369] arXiv:1003.4071 [pdf, other]
Title: A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations
Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Cryptography and Security (cs.CR)
[370] arXiv:1003.4073 [pdf, other]
Title: Quality of Service with Bandwidth
Shivaji P. Mirashe, N. V. Kalyankar
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Networking and Internet Architecture (cs.NI)
[371] arXiv:1003.4074 [pdf, other]
Title: Cloud Computing
Shivaji P. Mirashe, N. V. Kalyankar
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[372] arXiv:1003.4075 [pdf, other]
Title: A Neuro-Fuzzy Multi Swarm FastSLAM Framework
R. Havangi, M. Teshnehlab, M. A. Nekoui
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Robotics (cs.RO)
[373] arXiv:1003.4076 [pdf, other]
Title: Similarity Data Item Set Approach: An Encoded Temporal Data Base Technique
M. S. Danessh, C. Balasubramanian, K. Duraiswamy
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Databases (cs.DB)
[374] arXiv:1003.4077 [pdf, other]
Title: Mapping The Best Practices of XP and Project Management: Well defined approach for Project Manager
Muhammad Javed, Bashir Ahmad, Shahid Hussain, Shakeel Ahmad
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Software Engineering (cs.SE)
[375] arXiv:1003.4078 [pdf, other]
Title: A Group Vehicular Mobility Model for Routing Protocol Analysis in Mobile Ad Hoc Network
Shrirang Ambaji Kulkarni, G Raghavendra Rao
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Networking and Internet Architecture (cs.NI)
[376] arXiv:1003.4079 [pdf, other]
Title: Gene Expression Data Knowledge Discovery using Global and Local Clustering
Swathi. H
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Computational Engineering, Finance, and Science (cs.CE); Machine Learning (cs.LG); Genomics (q-bio.GN)
[377] arXiv:1003.4080 [pdf, other]
Title: A RFID-based Campus Context-Aware Notification System
Nazleeni S. Haron, Nur S. Saleem, Mohd H. Hasan, Mazeyanti M. Ariffin, Izzatdin A. Aziz
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Networking and Internet Architecture (cs.NI)
[378] arXiv:1003.4081 [pdf, other]
Title: Fuzzy-based Navigation and Control of a Non-Holonomic Mobile Robot
Razif Rashid, I. Elamvazuthi, Mumtaj Begam, M. Arrofiq
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Neural and Evolutionary Computing (cs.NE); Robotics (cs.RO)
[379] arXiv:1003.4083 [pdf, other]
Title: Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) Techniques
Lindasalwa Muda, Mumtaj Begam, I. Elamvazuthi
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Multimedia (cs.MM)
[380] arXiv:1003.4084 [pdf, other]
Title: New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files
Hamdan.O.Alanazi, A.A.Zaidan, B.B.Zaidan, Hamid A.Jalab, Zaidoon Kh. AL-Ani
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR)
[381] arXiv:1003.4085 [pdf, other]
Title: New Comparative Study Between DES, 3DES and AES within Nine Factors
Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir, Y. Al-Nabhani
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Cryptography and Security (cs.CR)
[382] arXiv:1003.4086 [pdf, other]
Title: Overview: Main Fundamentals for Steganography
Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan, Hamdan.O.Alanazi
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Cryptography and Security (cs.CR); Multimedia (cs.MM)
[383] arXiv:1003.4087 [pdf, other]
Title: Land-cover Classification and Mapping for Eastern Himalayan State Sikkim
Ratika Pradhan, Mohan P. Pradhan, Ashish Bhusan, Ronak K. Pradhan, M. K. Ghose
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[384] arXiv:1003.4088 [pdf, other]
Title: Proficient Pair of Replacement Algorithms on L1 and L2 Cache for Merge Sort
Richa Gupta, Sanjiv Tokekar
Journal-ref: Journal of Computing, Volume 2, Issue 3, March 2010, https://sites.google.com/site/journalofcomputing/
Subjects: Operating Systems (cs.OS)
[385] arXiv:1003.4090 [pdf, other]
Title: Modeling and Reasoning over Distributed Systems using Aspect-Oriented Graph Grammars
Rodrigo Machado (Universidade Federal do Rio Grande do Sul), Reiko Heckel (University of Leicester), Leila Ribeiro (Universidade Federal do Rio Grande do Sul)
Journal-ref: EPTCS 21, 2010, pp. 39-50
Subjects: Logic in Computer Science (cs.LO); Programming Languages (cs.PL); Software Engineering (cs.SE)
[386] arXiv:1003.4105 [pdf, other]
Title: Complexity of Problems for Commutative Grammars
Eryk Kopczyński
Comments: Full version of submission to LICS 2010
Subjects: Formal Languages and Automata Theory (cs.FL)
[387] arXiv:1003.4127 [pdf, other]
Title: An Asymptotic Preserving Scheme for the ES-BGK model
Francis Filbet (ICJ), Shi Jin (DM)
Subjects: Numerical Analysis (math.NA)
[388] arXiv:1003.4140 [pdf, other]
Title: Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation
Feng Gu, Julie Greensmith, Uwe Aickelin
Comments: 8 pages, 7 tables, 3 figures, Genetic and Evolutionary Computation Conference (GECCO 2009), Montreal, Canada
Journal-ref: Proceedings of Genetic and Evolutionary Computation Conference (GECCO 2009), Montreal, Canada, 1203-1210
Subjects: Neural and Evolutionary Computing (cs.NE); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[389] arXiv:1003.4141 [pdf, other]
Title: Investigating Output Accuracy for a Discrete Event Simulation Model and an Agent Based Simulation Model
Mazlina Abdul Majid, Uwe Aickelin, Peer-Olaf Siebers
Comments: 5 pages, 4 figures, INFORMS Simulation Society Research Workshop
Journal-ref: Proceedings of the INFORMS Simulation Society Research Workshop, June 25-27, 2009, Warwick, UK, 101-105
Subjects: Artificial Intelligence (cs.AI); Computational Engineering, Finance, and Science (cs.CE); Multiagent Systems (cs.MA)
[390] arXiv:1003.4142 [pdf, other]
Title: Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory
Jungwon Kim, Julie Greensmith, Jamie Twycross, Uwe Aickelin
Comments: 4 pages, 1 table, Adaptive and Resilient Computing Security Workshop (ARCS-05), Santa Fe, USA
Journal-ref: Proceedings of Adaptive and Resilient Computing Security Workshop (ARCS-05), Santa Fe, USA, 2005,
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR); Neural and Evolutionary Computing (cs.NE)
[391] arXiv:1003.4145 [pdf, other]
Title: Mimicking the Behaviour of Idiotypic AIS Robot Controllers Using Probabilistic Systems
Amanda Whitbrook, Uwe Aickelin, Jonathan Garibaldi
Comments: 7 pages, 2 figures, 6 tables, 13th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2009, Orlando, Florida, USA
Journal-ref: Proceedings of the 13th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2009, Orlando, Florida, USA, 272-278
Subjects: Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE); Robotics (cs.RO)
[392] arXiv:1003.4146 [pdf, other]
Title: A Mathematical Approach to the Study of the United States Code
Michael J. Bommarito II, Daniel Martin Katz
Comments: 5 pages, 6 figures, 2 tables.
Subjects: Information Retrieval (cs.IR); Computers and Society (cs.CY); Digital Libraries (cs.DL); Physics and Society (physics.soc-ph)
[393] arXiv:1003.4149 [pdf, other]
Title: Les Entités Nommées : usage et degrés de précision et de désambiguïsation
Claude Martineau (IGM-LabInfo), Elsa Tolone (IGM-LabInfo), Stavroula Voyatzi (IGM-LabInfo)
Journal-ref: 26\`eme Colloque international sur le Lexique et la Grammaire (LGC'07), Bonifacio : France (2007)
Subjects: Computation and Language (cs.CL)
[394] arXiv:1003.4187 [pdf, other]
Title: Comparing Repository Types - Challenges and barriers for subject-based repositories, research repositories, national repository systems and institutional repositories in serving scholarly communication
Chris Armbruster (MPDL), Laurent Romary (INRIA Saclay - Ile de France, IDSL)
Subjects: Digital Libraries (cs.DL)
[395] arXiv:1003.4196 [pdf, other]
Title: Development of a Cargo Screening Process Simulator: A First Approach
Peer-Olaf Siebers, Galina Sherman, Uwe Aickelin
Comments: 10 pages, 7 figures, 6th International Mediterranean Modeling Multiconference (EMSS 2009), Tenerife, Spain
Journal-ref: Proceedings of the 6th International Mediterranean Modeling Multiconference (EMSS 2009), Tenerife, Spain, 200-209
Subjects: Artificial Intelligence (cs.AI); Computational Engineering, Finance, and Science (cs.CE); Multiagent Systems (cs.MA)
[396] arXiv:1003.4270 [pdf, other]
Title: Wireless Network Coding with Imperfect Overhearing
Haishi Ning, Cong Ling, Kin K. Leung
Comments: 21 pages, 6 figures, IEEE Trans. Commun.
Subjects: Information Theory (cs.IT)
[397] arXiv:1003.4274 [pdf, other]
Title: Unbeatable Imitation
Peter Duersch, Joerg Oechssler, Burkhard C. Schipper
Subjects: Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG)
[398] arXiv:1003.4277 [pdf, other]
Title: Pure Saddle Points and Symmetric Relative Payoff Games
Peter Duersch, Joerg Oechssler, Burkhard C. Schipper
Subjects: Computer Science and Game Theory (cs.GT)
[399] arXiv:1003.4287 [pdf, other]
Title: Towards automated high-throughput screening of C. elegans on agar
Mayank Kabra, Annie L. Conery, Eyleen J. O'Rourke, Xin Xie, Vebjorn Ljosa, Thouis R. Jones, Frederick M. Ausubel, Gary Ruvkun, Anne E. Carpenter, Yoav Freund
Subjects: Computer Vision and Pattern Recognition (cs.CV); Genomics (q-bio.GN)
[400] arXiv:1003.4302 [pdf, other]
Title: Optimal Unitary Linear Processing for Amplify-and-Forward Cooperative OFDM systems
Min Dong, Mahdi Hajiaghayi, Ben Liang
Comments: This paper has been withdrawn by the authors
Subjects: Information Theory (cs.IT); Optimization and Control (math.OC)
Total of 624 entries : 1-50 ... 201-250 251-300 301-350 351-400 401-450 451-500 501-550 ... 601-624
Showing up to 50 entries per page: fewer | more | all
  • About
  • Help
  • contact arXivClick here to contact arXiv Contact
  • subscribe to arXiv mailingsClick here to subscribe Subscribe
  • Copyright
  • Privacy Policy
  • Web Accessibility Assistance
  • arXiv Operational Status
    Get status notifications via email or slack