首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Computer Science
ISSN Print:
ISSN Online:
主页:
http://arxiv.org/corr
分享:
Go
An Empirical Comparison of Neural Architectures for Reinforcement Learning in Partially Observable Environments
Denis Steckelmacher
,
Peter Vrancx
Increasing the Action Gap: New Operators for Reinforcement Learning
Marc G. Bellemare
,
Georg Ostrovski
,
Arthur Guez
,
Philip S. Thomas
,
Rémi Munos
Learning the Semantics of Manipulation Action
Yezhou Yang
,
Yiannis Aloimonos
,
Cornelia Fermuller
,
Eren Erdal Aksoy
A Practically Efficient Algorithm for Generating Answers to Keyword Search over Data Graphs
Konstantin Golenberg
,
Yehoshua Sagiv
Graphs of Edge-Intersecting and Non-Splitting One Bend Paths in a Grid
Arman Boyac?
,
T?naz Ekim
,
Mordechai Shalom
,
Shmuel Zaks
Discriminative Subnetworks with Regularized Spectral Learning for Global-state Network Data
Xuan Hong Dang
,
Ambuj K. Singh
,
Petko Bogdanov
,
Hongyuan You
,
Bayyuan Hsu
Quantifying Orphaned Annotations in Hypothes.is
Mohamed Aturban
,
Michael L. Nelson
,
Michele C. Weigle
Lower Bounds for the Domination Numbers of Connected Graphs without Short Cycles
Yinglei Song
Contributions to the compositional semantics of first-order predicate logic
Philip Kelly
,
M. H. van Emden
Content-based Multi-path Routing in Structured Cyclic Overlays
Muhammad Shafique
Reactive Receiver Modeling for Diffusive Molecular Communication Systems with Molecule Degradation
Arman Ahmadzadeh
,
Hamidreza Arjmanidi
,
Andreas Burkovski
,
Robert Schober
A new robust adaptive algorithm for underwater acoustic channel equalization
Dariush Kari
,
Muhammed Omer Sayin
,
Suleyman Serdar Kozat
Using machine learning for medium frequency derivative portfolio trading
Abhijit Sharang
,
Chetan Rao
Behavioral Modeling for Churn Prediction: Early Indicators and Accurate Predictors of Custom Defection and Loyalty
Muhammad R. Khan
,
Johua Manoj
,
Anikate Singh
,
Joshua Blumenstock
ATD: Anomalous Topic Discovery in High Dimensional Discrete Data
Hossein Soleimani
,
David J. Miller
Proceedings XV Jornadas sobre Programación y Lenguajes
Marisa Navarro
The interface for functions in the dune-functions module
Christian Engwer
,
Carsten Gr?ser
,
Steffen Müthing
,
Oliver Sander
Process Realizability
Samson Abramsky
Geometry-covering Jammer Localization based on Distance Comprehension in Wireless Sensor Networks
Sheng Wang
,
Chunliang Chu
Power-Delay Tradeoff with Predictive Scheduling in Integrated Cellular and Wi-Fi Networks
Haoran Yu
,
Man Hon Cheung
,
Longbo Huang
,
Jianwei Huang
SR-Clustering: Semantic Regularized Clustering for Egocentric Photo Streams Segmentation
Mariella Dimiccoli
,
Marc Bola?os
,
Estefania Talavera
,
Maedeh Aghaei
,
Stavri G. Nikolov
,
Petia Radeva
Implementation of deep learning algorithm for automatic detection of brain tumors using intraoperative IR-thermal mapping data
A. V. Makarenko
,
M. G. Volovik
Multi-Instance Visual-Semantic Embedding
Zhou Ren
,
Hailin Jin
,
Zhe Lin
,
Chen Fang
,
Alan Yuille
Mobile Cloud Business Process Management System for the Internet of Things: Review, Challenges and Blueprint
Chii Chang
,
Satish Narayana Srirama
,
Rajkumar Buyya
Cost-based Feature Transfer for Vehicle Occupant Classification
Toby Perrett
,
Majid Mirmehdi
,
Eduardo Dias
HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks
Adrian Segall
The Bi-Objective Workflow Satisfiability Problem and Workflow Resiliency
Jason Crampton
,
Gregory Gutin
,
Daniel Karapetyan
,
Rémi Watrigant
SRPS: Secure Routing Protocol for Static Sensor Networks
Hamoinba Vebarin
,
Samourqi Difrawi
Evaluation of Time-Critical Communications for IEC 61850-Substation Network Architecture
Ahmed Altaher
,
Stéphane Mocanu
,
Jean-Marc Thiriet
Feature Selection for Classification under Anonymity Constraint
Baichuan Zhang
,
Vachik Dave
,
Mohammad Al Hasan
Building and Searching a Balanced, Distributed k-d Tree with MapReduce
Russell A. Brown
Botnets Drilling Away Privacy Infrastructure
Yang Yang
,
Christophe Leung
On-the fly AES Decryption/Encryption for Cloud SQL Databases
Sushil Jajodia
,
Witold Litwin
,
Thomas Schwarz
Remote Health Coaching System and Human Motion Data Analysis for Physical Therapy with Microsoft Kinect
Qifei Wang
,
Gregorij Kurillo
,
Ferda Ofli
,
Ruzena Bajcsy
SourcererCC: Scaling Code Clone Detection to Big Code
Hitesh Sajnani
,
Vaibhav Saini
,
Jeffrey Svajlenko
,
Chanchal K. Roy
,
Cristina V. Lopes
Design and Analysis of Secure Exam Protocols
Rosario Giustolisi
Learning Deep Convolutional Neural Networks for Places2 Scene Recognition
Li Shen
,
Zhouchen Lin
,
Qingming Huang
On Voting and Facility Location
Michal Feldman
,
Amos Fiat
,
Iddan Golomb
Improved Balanced Flow Computation Using Parametric Flow
Omar Darwish
,
Kurt Mehlhorn
Deformable Distributed Multiple Detector Fusion for Multi-Person Tracking
Andy J Ma
,
Pong C Yuen
,
Suchi Saria
Optimization of Tree Modes for Parallel Hash Functions
Kevin Atighehchi
,
Robert Rolland
Robustness enhancement of cloud computing network based on coupled networks model
Zibin Su
,
Jing Yuan
Security Algorithms for Cloud Computing Environment
Akashdeep Bhardwaj
,
GVB Subrahmanyam
,
Vinay Avasthi
,
Hanumat Sastry
Modelling and Analysis of Network Security - an Algebraic Approach
Qian Zhang
,
Ying Jiang
,
Peng Wu
WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor
Marc Juarez
,
Mohsen Imani
,
Mike Perry
,
Claudia Diaz
,
Matthew Wright
Multiclass Classification of Cervical Cancer Tissues by Hidden Markov Model
Sabyasachi Mukhopadhyay
,
Sanket Nandan
,
Indrajit Kurmi
Face Hallucination using Linear Models of Coupled Sparse Support
Reuben Farrugia
,
Christine Guillemot
A faster fixed parameter algorithm for two-layer crossing minimization
Yasuaki Kobayashi
,
Hisao Tamaki
An Encrypted Trust-Based Routing Protocol
Youssef Gahi
,
Mouhcine Guennoun
,
Zouhair Guennoun
,
Khalil El-Khatib
Data Protection: Combining Fragmentation, Encryption, and Dispersion, an Intermediary report
Gerard Memmi
,
Katarzyna Kapusta
,
Han Qiu
Go