Sciweavers

2913 search results - page 380 / 583
» How Much to Copy
Sort
View
106
Voted
ERCIMDL
2007
Springer
95views Education» more  ERCIMDL 2007»
15 years 10 months ago
A Study of Citations in Users' Online Personal Collections
Users’ personal citation collections reflect users’ interests and thus offer great potential for personalized digital services. We studied 18,120 citations in the personal co...
Nishikant Kapoor, John T. Butler, Sean M. McNee, G...
145
Voted
CVPR
2009
IEEE
15 years 10 months ago
Catadioptric Projectors
We present a catadioptric projector analogous to a catadioptric camera by combining a commodity digital projector with additional optical units. We show that, by using specially sh...
Yuanyuan Ding, Jing Xiao, Kar-Han Tan, Jingyi Yu
153
Voted
ICALP
2007
Springer
15 years 10 months ago
Quasi-randomness and Algorithmic Regularity for Graphs with General Degree Distributions
Abstract. We deal with two intimately related subjects: quasi-randomness and regular partitions. The purpose of the concept of quasi-randomness is to measure how much a given graph...
Noga Alon, Amin Coja-Oghlan, Hiêp Hàn...
132
Voted
ICALP
2007
Springer
15 years 10 months ago
Checking and Spot-Checking the Correctness of Priority Queues
We revisit the problem of memory checking considered by Blum et al. [3]. In this model, a checker monitors the behavior of a data structure residing in unreliable memory given an a...
Matthew Chu, Sampath Kannan, Andrew McGregor
113
Voted
ISPEC
2007
Springer
15 years 9 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...