Sciweavers

473 search results - page 50 / 95
» Computing excluded minors
Sort
View
WAW
2007
Springer
120views Algorithms» more  WAW 2007»
15 years 6 months ago
Manipulation-Resistant Reputations Using Hitting Time
Popular reputation systems for linked networks can be manipulated by spammers who strategically place links. The reputation of node v is interpreted as the world’s opinion of vā...
John E. Hopcroft, Daniel Sheldon
109
Voted
CVPR
2010
IEEE
15 years 6 months ago
3D Morphable Model Construction for Robust Ear and Face Recognition
Recent work suggests that the human ear varies significantly between different subjects and can be used for identification. In principle, therefore, using ears in addition to the f...
John D. Bustard, Mark S. Nixon
102
Voted
GECCO
2005
Springer
103views Optimization» more  GECCO 2005»
15 years 6 months ago
Validation of evolutionary activity metrics for long-term evolutionary dynamics
As artificial life systems grow in number and sophistication, it is becoming increasingly important that the field agree on principled metrics for evaluating them. This report d...
Andrew Stout, Lee Spector
IH
2005
Springer
15 years 6 months ago
Censorship Resistance Revisited
Abstract. ā€œCensorship resistantā€ systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang
104
Voted
PVM
2004
Springer
15 years 5 months ago
Neighborhood Composition: A Parallelization of Local Search Algorithms
Abstract. To practically solve NP-hard combinatorial optimization problems, local search algorithms and their parallel implementations on PVM or MPI have been frequently discussed....
Yuichi Handa, Hirotaka Ono, Kunihiko Sadakane, Mas...