Sciweavers

473 search results - page 82 / 95
» Computing excluded minors
Sort
View
122
Voted
SCIENTOMETRICS
2011
14 years 3 months ago
Effect on the journal impact factor of the number and document type of citing records: a wide-scale study
Abstract We studied the effect on journal impact factors (JIF) of citations from documents labeled as articles and reviews (usually peer reviewed) versus citations coming from othe...
Juan Miguel Campanario, Jesús Carretero, Ve...
EMSOFT
2011
Springer
14 years 10 days ago
From boolean to quantitative synthesis
Motivated by improvements in constraint-solving technology and by the increase of routinely available computational power, partial-program synthesis is emerging as an effective a...
Pavol Cerný, Thomas A. Henzinger
106
Voted
CCS
2009
ACM
15 years 5 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
102
Voted
RECOMB
2009
Springer
16 years 1 months ago
How Many Bootstrap Replicates Are Necessary?
Phylogenetic Bootstrapping (BS) is a standard technique for inferring confidence values on phylogenetic trees that is based on reconstructing many trees from minor variations of th...
Nicholas D. Pattengale, Masoud Alipour, Olaf R. P....
IPPS
2007
IEEE
15 years 7 months ago
Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks
: Peer-to-Peer (P2P) reputation systems are needed to evaluate the trustworthiness of participating peers and to combat selfish and malicious peer behaviors. The reputation system ...
Runfang Zhou, Kai Hwang