Sciweavers

SAC
2012
ACM
13 years 8 months ago
Decrypting classical cipher text using Markov chain Monte Carlo
In this paper, we present the use of Markov Chain Monte Carlo (MCMC) methods to attack the classical ciphers. We use frequency analysis as our basic tool. First we investigate the...
Jian Chen, Jeffrey S. Rosenthal
SBP
2012
Springer
13 years 8 months ago
Opinion Dynamics in Gendered Social Networks: An Examination of Female Engagement Teams in Afghanistan
International forces in Afghanistan have experienced difficulties in developing constructive engagements with the Afghan population, an experience familiar to a wide range of inter...
Thomas W. Moore, Patrick D. Finley, Ryan J. Hammer...
128
Voted
SCW
2012
IEEE
13 years 8 months ago
Linear cost share equilibria and the veto power of the grand coalition
We consider pure exchange economies with finitely many private goods involving the choice of a public project. We discuss core-equivalence results in the general framework of non...
Maria Gabriella Graziano, Maria Romaniello
BIRTHDAY
2012
Springer
13 years 8 months ago
The Logical Execution Time Paradigm
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Christoph M. Kirsch, Ana Sokolova
103
Voted
SBP
2012
Springer
13 years 8 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
Applied Computing
Top of PageReset Settings