Sciweavers

966 search results - page 158 / 194
» Small Alliances in Graphs
Sort
View
AIRWEB
2006
Springer
14 years 13 days ago
Web Spam Detection with Anti-Trust Rank
Spam pages on the web use various techniques to artificially achieve high rankings in search engine results. Human experts can do a good job of identifying spam pages and pages wh...
Vijay Krishnan, Rashmi Raj
CGO
2004
IEEE
14 years 13 days ago
Single-Dimension Software Pipelining for Multi-Dimensional Loops
Traditionally, software pipelining is applied either to the innermost loop of a given loop nest or from the innermost loop to outer loops. In this paper, we propose a threestep ap...
Hongbo Rong, Zhizhong Tang, Ramaswamy Govindarajan...
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
14 years 12 days ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
DGCI
2006
Springer
14 years 11 days ago
A Network Flow Algorithm for Binary Image Reconstruction from Few Projections
Tomography deals with the reconstruction of images from their projections. In this paper we focus on tomographic reconstruction of binary images (i.e., black-and-white) that do not...
Kees Joost Batenburg
ESWS
2006
Springer
14 years 10 days ago
Modelling Ontology Evaluation and Validation
We present a comprehensive approach to ontology evaluation and validation, which have become a crucial problem for the development of semantic technologies. Existing evaluation met...
Aldo Gangemi, Carola Catenacci, Massimiliano Ciara...