Sciweavers

1478 search results - page 251 / 296
» Modular Complexity Analysis via Relative Complexity
Sort
View
CICLING
2003
Springer
14 years 29 days ago
Computing with Realizational Morphology
The theory of realizational morphology presented by Stump in his influential book Inflectional Morphology (2001) describes the derivation of inflected surface forms from underly...
Lauri Karttunen
WADS
2001
Springer
137views Algorithms» more  WADS 2001»
14 years 4 days ago
Visual Ranking of Link Structures
Methods for ranking World Wide Web resources according to their position in the link structure of the Web are receiving considerable attention, because they provide the first e...
Ulrik Brandes, Sabine Cornelsen
ECIS
2004
13 years 9 months ago
The overconfidence effect and IT professionals
Information Technology has become a core activity in most, if not all, corporations. Although IT managers continue to be under-represented in executive management, the very centra...
Glen L. Van der Vyver
EUROPAR
2010
Springer
13 years 8 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
GRC
2008
IEEE
13 years 8 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...