Sciweavers

1439 search results - page 133 / 288
» Fast approximation of centrality
Sort
View
CP
2004
Springer
15 years 6 months ago
The Tractability of Global Constraints
Abstract. Constraint propagation is one of the techniques central to the success of constraint programming. Fast algorithms are used to prune the search space either before or duri...
Christian Bessière, Emmanuel Hebrard, Brahi...
ACSAC
2002
IEEE
15 years 5 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
CP
1999
Springer
15 years 5 months ago
Optimal Distributed Arc-Consistency
This paper presents DisAC-9, the first optimal distributed algorithm performing the arc-consistency of a constraint network. Our method is optimal according to the number of messa...
Youssef Hamadi
113
Voted
FC
2010
Springer
188views Cryptology» more  FC 2010»
15 years 4 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
93
Voted
JNS
2008
79views more  JNS 2008»
15 years 23 days ago
Singularly Perturbed Monotone Systems and an Application to Double Phosphorylation Cycles
The theory of monotone dynamical systems has been found very useful in the modeling of some gene, protein, and signaling networks. In monotone systems, every net feedback loop is p...
Liming Wang, Eduardo D. Sontag