Sciweavers

1414 search results - page 271 / 283
» Combining Intruder Theories
Sort
View
64
Voted
DB
2008
73views more  DB 2008»
14 years 9 months ago
Environmental influences on gender in the IT workforce
In an effort to better understand the underrepresentation of women within the IT profession, one promising line of investigation is the influence of factors in the socio-cultural ...
Eileen M. Trauth, Jeria L. Quesenberry, Benjamin Y...
EJC
2008
14 years 9 months ago
Fractional coloring and the odd Hadwiger's conjecture
Gerards and Seymour (see [T.R. Jensen, B. Toft, Graph Coloring Problems, Wiley-Interscience, 1995], page 115) conjectured that if a graph has no odd complete minor of order p, the...
Ken-ichi Kawarabayashi, Bruce A. Reed
CAGD
2006
114views more  CAGD 2006»
14 years 9 months ago
Jet subdivision schemes on the k-regular complex
We introduce a new family of subdivision schemes called jet subdivision schemes. Jet subdivision schemes are a natural generalization of the commonly used subdivision schemes for ...
Yonggang Xue, Thomas P.-Y. Yu, Tom Duchamp
COR
2006
129views more  COR 2006»
14 years 9 months ago
Game-theoretic analysis of an ancient Chinese horse race problem
This paper analyzes a legendary Chinese horse race problem involving the King of Qi and General Tianji which took place more than 2000 years ago. In this problem each player owns ...
Mingming Leng, Mahmut Parlar
CORR
2006
Springer
143views Education» more  CORR 2006»
14 years 9 months ago
A Knowledge-Based Approach for Selecting Information Sources
Through the Internet and the World-Wide Web, a vast number of information sources has become available, which offer information on various subjects by different providers, often i...
Thomas Eiter, Michael Fink, Hans Tompits