Search
Selected: H

How to Keep Hungry Heroes Healthy and Happy

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to make a comet

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to Make Otherworldly Oxygen Isotope Signatures on Earth and to Preserve Them in Rocks

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to make the most of a shared meal: plan the last bite first

Computer Science – Computer Science and Game Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to make the top ten: Approximating PageRank from in-degree

Computer Science – Information Retrieval
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to Maximize User Satisfaction Degree in Multi-service IP Networks

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to measure efficiency?

Computer Science – Computer Science and Game Theory
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to measure the gas mass: predictions for JCMT, APEX, Herschel and SOFIA

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to meet asynchronously (almost) everywhere

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to move a planet

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to obtain efficient GPU kernels: an illustration using FMM & FGT algorithms

Computer Science – Mathematical Software
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to Play Unique Games against a Semi-Random Adversary

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to Play Unique Games on Expanders

Computer Science – Data Structures and Algorithms
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to prevent type-flaw and multi-protocol attacks on cryptographic protocols under Exclusive-OR

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to prevent type-flaw attacks on security protocols under algebraic properties

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to prolong network life-span in wireless networks

Computer Science – Networking and Internet Architecture
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to reach sub-1% photometry in an all-sky survey such as LSST

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to realize "a sense of humour" in computers ?

Computer Science – Computation and Language
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to Reconcile Models and Observations of SGR A*?

Computer Science
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

How to retrieve priced data

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.