Sciweavers

1931 search results - page 65 / 387
» Why we blog
Sort
View
GECCO
2006
Springer
161views Optimization» more  GECCO 2006»
14 years 11 days ago
An empirical investigation of how and why neutrality affects evolutionary search
The effects of neutrality on evolutionary search have been considered in a number of interesting studies, the results of which, however, have been contradictory. Some researchers ...
Edgar Galván López, Riccardo Poli
CHI
2009
ACM
14 years 1 days ago
I just don't know why it's gone: maintaining informal information use in inpatient care
We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng
CRYPTO
2008
Springer
92views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
Compression from Collisions, or Why CRHF Combiners Have a Long Output
A black-box combiner for collision resistant hash functions (CRHF) is a construction which given black-box access to two hash functions is collision resistant if at least one of th...
Krzysztof Pietrzak
ICWSM
2010
13 years 10 months ago
Why do Users Tag? Detecting Users' Motivation for Tagging in Social Tagging Systems
While recent progress has been achieved in understanding the structure and dynamics of social tagging systems, we know little about the underlying user motivations for tagging, an...
Markus Strohmaier, Christian Körner, Roman Ke...
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
13 years 10 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan