Identification is regarded as an important aspect of beneficial online interaction. In addition to providing the individual with potential psychological benefits, identification w...
We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have bee...
Algorithms have cometo be recognizedasthe cornerstone of computing. Surprisingly, there has been little research or discussion of general techniques for designing algorithms. Thou...
We provide a new algorithm for indefinite nested summation which is applicable to summands involving unspecified sequences x(n). More than that, we show how to extend Karr's ...
Abstract. We consider documents as words and trees on some alphabet and study how to compare them with some regular schemas on an alphabet . Given an input document I, we decide ...