Sciweavers

945 search results - page 127 / 189
» Graph Types
Sort
View
125
Voted
ACSAC
2003
IEEE
15 years 6 months ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn
123
Voted
IPPS
1995
IEEE
15 years 6 months ago
Performance evaluation of a new parallel preconditioner
The linear systems associated with large, sparse, symmetric, positive definite matrices are often solved iteratively using the preconditioned conjugate gradient method. We have d...
Keith D. Gremban, Gary L. Miller, Marco Zagha
CSE
2009
IEEE
15 years 6 months ago
Analyzing Enterprise Social Media Networks
Broadening adoption of social media applications within the enterprise offers a new and valuable data source for insight into the social structure of organizations. Social media ap...
Marc A. Smith, Derek L. Hansen, Eric Gleave
WSC
2007
15 years 4 months ago
Requirements and design principles for multisimulation with multiresolution, multistage multimodels
The significance of simulation modeling at multiple levels, scales, and perspectives is well recognized. However, existing proposals for developing such models are often applicati...
Levent Yilmaz, Alvin Lim, Simon Bowen, Tuncer I. &...
123
Voted
AAIM
2008
Springer
142views Algorithms» more  AAIM 2008»
15 years 4 months ago
Engineering Label-Constrained Shortest-Path Algorithms
We consider a generalization of the shortest-path problem: given an alphabet , a graph G whose edges are weighted and -labeled, and a regular language L , the L-constrained shortes...
Christopher L. Barrett, Keith R. Bisset, Martin Ho...