Sciweavers

CORR
2006
Springer
68views Education» more  CORR 2006»
13 years 8 months ago
A rigorous proof of the cavity method for counting matchings
In this paper we rigorously prove the validity of the cavity method for the problem of counting the number of matchings in graphs with large girth. Cavity method is an important he...
Mohsen Bayati, Chandra Nair
CORR
2006
Springer
98views Education» more  CORR 2006»
13 years 8 months ago
Fusion of qualitative beliefs using DSmT
Florentin Smarandache, Jean Dezert
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 8 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
CORR
2006
Springer
79views Education» more  CORR 2006»
13 years 8 months ago
Geometric definition of a new skeletonization concept
Yannis Bakopoulos, Theophanis Raptis, Doxaras Ioan...
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 8 months ago
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibriu...
Nicolai Kuntze, Dominique Maehler, Andreas U. Schm...
CORR
2006
Springer
80views Education» more  CORR 2006»
13 years 8 months ago
A polynomial-time approximation algorithm for the number of k-matchings in bipartite graphs
We show that the number of k-matching in a given undirected graph G is equal to the number of perfect matching of the corresponding graph Gk on an even number of vertices divided ...
Shmuel Friedland, Daniel Levy
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 8 months ago
Bidding to the Top: VCG and Equilibria of Position-Based Auctions
Gagan Aggarwal, S. Muthukrishnan, Jon Feldman