Sciweavers

424 search results - page 47 / 85
» types 1999
Sort
View
COMPUTER
1999
82views more  COMPUTER 1999»
15 years 3 months ago
Mapping the Internet
Discovery of a network topology is a challenging task. Available algorithms that rely on simple hop-limited, traceroute-style probes give different performance in terms of the com...
Hal Burch, Bill Cheswick
DM
1999
109views more  DM 1999»
15 years 3 months ago
Hamiltonian powers in threshold and arborescent comparability graphs
We examine powers of Hamiltonian paths and cycles as well as Hamiltonian (power) completion problems in several highly structured graph classes. For threshold graphs we give effic...
Sam Donnelly, Garth Isaak
ISD
1999
Springer
262views Database» more  ISD 1999»
15 years 8 months ago
Spatial Pictogram Enhanced Conceptual Data Models and Their Translation to Logical Data Models
The successful development of any geographic information system project needs the careful design and implementation of spatial databases via conceptual and logical data-modeling. T...
Shashi Shekhar, Ranga Raju Vatsavai, Sanjay Chawla...
CIA
1999
Springer
15 years 8 months ago
A Similarity Evaluation Technique for Cooperative Problem Solving with a Group of Agents
Abstract. Evaluations of distances or similarity measurements are very important in cooperative problem solving with multiple agents. Distance between problems is used by agents to...
Seppo Puuronen, Vagan Y. Terziyan
CORR
1999
Springer
138views Education» more  CORR 1999»
15 years 3 months ago
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the best known application of quantum cryptography. Previously proposed proofs of security of quantum key distribution contain various technical subtle...
Hoi-Kwong Lo