Sciweavers

183 search results - page 30 / 37
» The Degree Distribution of Random k-Trees
Sort
View
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 8 months ago
Maximum Bipartite Matching Size And Application to Cuckoo Hashing
Cuckoo hashing with a stash is a robust high-performance hashing scheme that can be used in many real-life applications. It complements cuckoo hashing by adding a small stash stor...
Josef Kanizo, David Hay, Isaac Keslassy
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
14 years 1 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
CORR
2011
Springer
196views Education» more  CORR 2011»
13 years 11 days ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
PODC
2004
ACM
14 years 2 months ago
Analyzing Kleinberg's (and other) small-world Models
We analyze the properties of Small-World networks, where links are much more likely to connect “neighbor nodes” than distant nodes. In particular, our analysis provides new re...
Charles U. Martel, Van Nguyen
BMCBI
2005
77views more  BMCBI 2005»
13 years 8 months ago
Structural comparison of metabolic networks in selected single cell organisms
Background: There has been tremendous interest in the study of biological network structure. An array of measurements has been conceived to assess the topological properties of th...
Dongxiao Zhu, Zhaohui S. Qin