Sciweavers

1692 search results - page 158 / 339
» Applying Science Models for Search
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 8 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
HICSS
2003
IEEE
137views Biometrics» more  HICSS 2003»
15 years 7 months ago
Augmented Cognition: Allocation of Attention
We describe a novel, model-based approach to augmented cognition. We first discuss a subset of cognitive limitations that are likely to impair performance. We then note traditiona...
Misha Pavel, Guoping Wang, Kehai Li
115
Voted
ICALP
2003
Springer
15 years 7 months ago
Optimal Cache-Oblivious Implicit Dictionaries
We consider the issues of implicitness and cache-obliviousness in the classical dictionary problem for n distinct keys over an unbounded and ordered universe. One finding in this ...
Gianni Franceschini, Roberto Grossi
ECIS
2004
15 years 3 months ago
Stray dogs and wild cats tracking down information systems in government?
This paper explores the body of e-government research surfaced during 1998-2003 in Web of Science and ProQuest. The search identified 158 scholarly papers. Using a classification ...
Kim Viborg Andersen, Helle Zinner Henriksen, Amar ...
141
Voted
CSC
2009
15 years 3 months ago
An Empirical Analysis of Approximation Algorithms for Euclidean TSP
- The Traveling Salesman Problem (TSP) is perhaps the most famous optimization problem in the set NP-hard. Many problems that are natural applications in computer science and engin...
Bárbara Rodeker, M. Virginia Cifuentes, Lil...