Sciweavers

147 search results - page 10 / 30
» Logarithmic keying
Sort
View
COCO
2007
Springer
114views Algorithms» more  COCO 2007»
14 years 4 months ago
Directed Planar Reachability is in Unambiguous Log-Space
We make progress in understanding the complexity of the graph reachability problem in the context of unambiguous logarithmic space computation; a restricted form of nondeterminism....
Chris Bourke, Raghunath Tewari, N. V. Vinodchandra...
FS
2006
135views more  FS 2006»
13 years 9 months ago
Asymmetric Information in Fads Models
Fads models were introduced by Shiller (1984) and Summers (1986) as plausible alternatives to the efficient markets/constant expected returns assumptions. Under these models, loga...
Paolo Guasoni
SODA
2004
ACM
89views Algorithms» more  SODA 2004»
13 years 11 months ago
The number of bit comparisons used by Quicksort: an average-case analysis
The analyses of many algorithms and data structures (such as digital search trees) for searching and sorting are based on the representation of the keys involved as bit strings and...
James Allen Fill, Svante Janson
COMPSEC
2000
117views more  COMPSEC 2000»
13 years 9 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
CSDA
2008
112views more  CSDA 2008»
13 years 10 months ago
Robustness of Fourier estimator of integrated volatility in the presence of microstructure noise
The finite sample properties of the Fourier estimator of integrated volatility under market microstructure noise are studied. Analytic expressions for the bias and the mean square...
M. E. Mancino, S. Sanfelici