Sciweavers

1692 search results - page 158 / 339
» Applying Science Models for Search
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 2 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
HICSS
2003
IEEE
137views Biometrics» more  HICSS 2003»
14 years 2 months ago
Augmented Cognition: Allocation of Attention
We describe a novel, model-based approach to augmented cognition. We first discuss a subset of cognitive limitations that are likely to impair performance. We then note traditiona...
Misha Pavel, Guoping Wang, Kehai Li
ICALP
2003
Springer
14 years 2 months ago
Optimal Cache-Oblivious Implicit Dictionaries
We consider the issues of implicitness and cache-obliviousness in the classical dictionary problem for n distinct keys over an unbounded and ordered universe. One finding in this ...
Gianni Franceschini, Roberto Grossi
ECIS
2004
13 years 10 months ago
Stray dogs and wild cats tracking down information systems in government?
This paper explores the body of e-government research surfaced during 1998-2003 in Web of Science and ProQuest. The search identified 158 scholarly papers. Using a classification ...
Kim Viborg Andersen, Helle Zinner Henriksen, Amar ...
CSC
2009
13 years 10 months ago
An Empirical Analysis of Approximation Algorithms for Euclidean TSP
- The Traveling Salesman Problem (TSP) is perhaps the most famous optimization problem in the set NP-hard. Many problems that are natural applications in computer science and engin...
Bárbara Rodeker, M. Virginia Cifuentes, Lil...