Search
Selected: (

(Meta) Kernelization

Computer Science – Discrete Mathematics
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(n,K)-user Interference Channels: Degrees of Freedom

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(Non)existence of Pleated Folds: How Paper Folds Between Creases

Computer Science – Computational Geometry
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(Non-)Equivalence of Universal Priors

Computer Science – Information Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(Non-)existence of Polynomial Kernels for the Test Cover Problem

Computer Science – Computational Complexity
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(Pu-244)-Xe formation and gas retention age, exposure history, and terrestrial age of angrites LEW86010 and LEW87051 - Comparison with Angra DOS Reis

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(RCFT) ReClustering Formation Technique in Hierarchical Sensor Network

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(Really) Tight bounds for dispatching binary methods

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(superseded) Yale Catalogue Trigonometric-Parallax Data (Jenkins 1963)

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(TEM) observations of shock damage in the Tenham chondrite

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(U Th) / Ne chronometry

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(U-Th)/He geochronology of single zircon grains of known Tertiary eruption age

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

(weak) Calibration is Computationally Hard

Computer Science – Computer Science and Game Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.