Sciweavers

324 search results - page 60 / 65
» Bounds for Functions of Dependent Risks
Sort
View
STOC
2010
ACM
170views Algorithms» more  STOC 2010»
13 years 11 months ago
Connectivity oracles for failure prone graphs
Dynamic graph connectivity algorithms have been studied for many years, but typically in the most general possible setting, where the graph can evolve in completely arbitrary ways...
Ran Duan, Seth Pettie
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
13 years 11 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
BIRTHDAY
2010
Springer
13 years 8 months ago
Choiceless Computation and Symmetry
Many natural problems in computer science concern structures like graphs where elements are not inherently ordered. In contrast, Turing machines and other common models of computa...
Benjamin Rossman
BMCBI
2006
107views more  BMCBI 2006»
13 years 7 months ago
Analysis of optimal phenotypic space using elementary modes as applied to Corynebacterium glutamicum
Background: Quantification of the metabolic network of an organism offers insights into possible ways of developing mutant strain for better productivity of an extracellular metab...
Kalyan Gayen, K. V. Venkatesh
CN
2004
130views more  CN 2004»
13 years 7 months ago
The effect of bandwidth and buffer pricing on resource allocation and QoS
Congestion-based pricing of network resources is a common approach in evolving network architectures that support Quality of Service (QoS). Resource usage and QoS will thus fluctu...
Nan Jin, Scott Jordan