Sciweavers

2060 search results - page 390 / 412
» Some Applications of Coding Theory in Computational Complexi...
Sort
View
118
Voted
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 10 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
148
Voted
IWCMC
2006
ACM
15 years 9 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
114
Voted
GD
2001
Springer
15 years 8 months ago
A Short Note on the History of Graph Drawing
The origins of chart graphics (e.g., bar charts and line charts) are well known, with the seminal event being the publication of William Playfair´s (1759-1823) ¨The Commercial a...
Eriola Kruja, Joe Marks, Ann Blair, Richard C. Wat...
166
Voted
GI
2009
Springer
15 years 1 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
234
Voted
AGP
2010
IEEE
15 years 8 months ago
Constraint Logic Programming
Constraint Logic Programming (CLP) is one of the most successful branches of Logic Programming; it attracts the interest of theoreticians and practitioners, and it is currently use...
Marco Gavanelli, Francesca Rossi