Search

Showing total 199 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Journal computer journal Remove constraint Journal: computer journal
199 results

Search Results

1. Discussion of the Papers by Rissanen and by Wallace and Dowe.

2. Capsule Reviews.

3. Capsule Reviews.

4. On the Security of the Stream Ciphers RCR-64 and RCR-32.

5. Capsule Reviews.

6. UK Performance Engineering Workshop 2010.

7. Rejoinder.

8. Capsule Reviews.

9. Signposting in Documents.

10. Artificial Intelligence Surpassing Human Intelligence: Factual or Hoax.

11. Introduction to the Special Issue on Probability Models in Performance Analysis.

12. Detecting Affine Equivalence Of Boolean Functions And Circuit Transformation.

13. Capsule Reviews.

14. Capsule Reviews.

15. Real-World Networks Are Not Always Fast Mixing.

16. Capsule Reviews.

17. Science, Mathematics, Computer Science, Software Engineering†.

18. Capsule Reviews.

19. Handling Synchronization Problem in Petri Net-Based System Design by Property-Preserving Transition-Reduction.

20. On Generating Set Index Functions for Randomized Caches.

21. Generating Candidates When Testing a Deterministic Implementation against a Non-deterministic Finite-state Machine.

22. Capsule Reviews.

23. A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions.

24. The Optimization of Memory Access Congestion for MapReduce Applications on Manycore Systems.

25. An Auction-Based Approach for Group Task Allocation in an Open Network Environment.

26. Special Issue on Discovery Science: Guest Editor's Introduction.

27. Capsule Reviews.

28. Interpreting Deep Structures of Information Systems Security.

29. Efficient Semantic Information Exchange for Ambient Intelligence.

30. Designing Effective Policies for Minimal Agents.

31. Energy-Efficient Cloud Computing.

32. Side-Channel Attack Using Meet-in-the-Middle Technique.

33. BLRL: Accurate and Efficient Warmup for Sampled Processor Simulation.

34. On the Minimality of Stream X-machines.

35. Lossless Compression.

36. On the Complexity of Some Verification Problems in Process Control Specifications.

37. Toward Effective and Reliable Digital Forensics.

38. A Comparative Study of Different Motif Occurrence Models Applied to a Hybrid Multiobjective Shuffle Frog Leaping Algorithm.

39. Efficient Reversible Data Hiding Using Multiple Predictors.

40. Capsule Reviews.

41. Capsule Reviews.

42. Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs.

43. Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks.

44. Multi-Label Classification Using Dependent and Independent Dual Space Reduction.

45. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.

46. An Optimal Algorithm for Untangling Binary Trees via Rotations.

47. Comparing the Service Component Architecture and Fractal Component Model.

48. Fast Generation of t-ary Trees.

49. Modal Logics are Coalgebraic1.

50. Convivial Ambient Technologies: Requirements, Ontology and Design.