Sciweavers

149 search results - page 17 / 30
» An integrated method for social network extraction
Sort
View
FSTTCS
2009
Springer
15 years 4 months ago
Iterative Methods in Combinatorial Optimization
We describe a simple iterative method for proving a variety of results in combinatorial optimization. It is inspired by Jain’s iterative rounding method (FOCS 1998) for designing...
R. Ravi
GD
1999
Springer
15 years 1 months ago
Centrality in Policy Network Drawings
—We introduce a network visualization technique that supports an analytical method applied in the social sciences. Policy network analysis is an approach to study policy making s...
Ulrik Brandes, Patrick Kenis, Dorothea Wagner
ECIS
2003
14 years 11 months ago
Towards an interdisciplinary theory of networks
Research problems in ICT networks often comprise coordination problems of information infrastructures and require state-of-the-art methods of coping with complex system dynamics. ...
Tim Weitzel, Oliver Wendt, Wolfgang König
CCS
2011
ACM
13 years 9 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
CASCON
2010
174views Education» more  CASCON 2010»
14 years 7 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia