For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
As part of a National Science Foundation-funded study, we analyze data from a 2002 Midwest urban random sample survey (n = 167 adults) of differential access to and uses of comput...
A recent area of significant progress in speaker recognition is the use of high level features—idiolect, phonetic relations, prosody, discourse structure, etc. A speaker not on...
William M. Campbell, Joseph P. Campbell, Douglas A...
A commonly encountered view of computer conferencing focuses on peer interaction, student empowerment and a shift in both teacher and student roles. This paper argues that this vi...
Ann C. Jones, Eileen Scanlon, Canan Tosunoglu Blak...
Data exchange deals with inserting data from one database into another database having a different schema. We study and solve a central computational problem of data exchange, nam...