Sciweavers

612 search results - page 89 / 123
» Hardness assumptions in the foundations of theoretical compu...
Sort
View
GI
2008
Springer
13 years 8 months ago
Bewertungsmechanismen zur beruflichen Weiterqualifizierung in sozialen Web 2.0-Netzwerken
Abstract: Mitarbeiterbeurteilungen sind eine wichtige Voraussetzung für die Weiterqualifizierung und Beförderung von Mitarbeitern. Identifizierte Stärken können durch diese bew...
Axel Winkelmann, Gottfried Vossen, Jörg Becke...
MFCS
2004
Springer
14 years 1 months ago
Generation Problems
Given a fixed computable binary operation , we study the complexity of the following generation problem: The input consists of strings ½ Ò . The question is whether is in the c...
Elmar Böhler, Christian Glaßer, Bernhar...
FOCS
2007
IEEE
14 years 2 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
MOBIHOC
2004
ACM
14 years 7 months ago
Internal synchronization of drift-constraint clocks in ad-hoc sensor networks
Clock synchronization is a crucial basic service in typical sensor networks, since the observations of distributed sensors more often than not need to be ordered ("a happened...
Lennart Meier, Philipp Blum, Lothar Thiele
ATAL
2005
Springer
14 years 1 months ago
Decentralized voting with unconditional privacy
The aggregation of conflicting preferences is a key issue in multiagent systems. Due to its universality, voting has a central role among preference aggregation mechanisms. Votin...
Felix Brandt, Tuomas Sandholm