Sciweavers

44 search results - page 6 / 9
» Detecting Possible Manipulators in Elections
Sort
View
SIAMCOMP
2002
98views more  SIAMCOMP 2002»
15 years 2 days ago
Self-Stabilizing Symmetry Breaking in Constant Space
abstract Alain Mayer Yoram Ofeky Rafail Ostrovskyz Moti Yungx We investigate the problem of self-stabilizing round-robin token management scheme on an anonymous bidirectional ring...
Alain J. Mayer, Rafail Ostrovsky, Yoram Ofek, Moti...
108
Voted
COLCOM
2007
IEEE
15 years 6 months ago
SemCW: Semantic collaborative writing using RST
—During collaborative writing each author works on a copy of the shared document. These copies are then merged to produce the final document. This asynchronous work is supported...
Charbel Rahhal, Hala Skaf-Molli, Pascal Molli, Nis...
IEEEIAS
2007
IEEE
15 years 6 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
91
Voted
COMPGEOM
2006
ACM
15 years 6 months ago
Complete subdivision algorithms, I: intersection of Bezier curves
We give the first complete subdivision algorithm for the intersection of two Bezier curves F, G, possibly with tangential intersections. Our approach to robust subdivision algori...
Chee-Keng Yap
101
Voted
AIRWEB
2005
Springer
15 years 6 months ago
Cloaking and Redirection: A Preliminary Study
Cloaking and redirection are two possible search engine spamming techniques. In order to understand cloaking and redirection on the Web, we downloaded two sets of Web pages while ...
Baoning Wu, Brian D. Davison