Sciweavers

870 search results - page 129 / 174
» Graph Comparison Using Fine Structure Analysis
Sort
View
ICALP
2005
Springer
15 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
EEE
2005
IEEE
15 years 3 months ago
Towards Effective Web Site Designs: A Framework for Modeling, Design Evaluation and Enhancement
Effective Web site design is critical to the success of e-commerce. Therefore, the evaluation and enhancement of a Web site design is of great importance. In this vein, accessibil...
Benjamin Yen, Paul Jen-Hwa Hu, May Wang
WSPI
2004
14 years 11 months ago
Analyzing Knowledge Management Systems: A Veritistic Approach
Knowledge management systems (KMS) are increasingly becoming popular and important in managing organizational knowledge. This motivates a closer inspection of the degree of usabili...
Palash Bera, Patrick Rysiew
P2P
2005
IEEE
137views Communications» more  P2P 2005»
15 years 3 months ago
The Essence of P2P: A Reference Architecture for Overlay Networks
The success of the P2P idea has created a huge diversity of approaches, among which overlay networks, for example, Gnutella, Kazaa, Chord, Pastry, Tapestry, P-Grid, or DKS, have r...
Karl Aberer, Luc Onana Alima, Ali Ghodsi, Sarunas ...
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
15 years 2 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...