Sciweavers

644 search results - page 91 / 129
» On the recommending of citations for research papers
Sort
View

Publication
208views
16 years 3 months ago
Making the Montreal indoor city accessible to people with disabilities
Indoor pedestrian networks are a facet of the built environment in many cities around the world. They can be built for many reasons, including separating pedestrians from motor veh...
Hagg, M. & El-Geneidy, A.
STOC
2006
ACM
130views Algorithms» more  STOC 2006»
16 years 2 months ago
On the fourier tails of bounded functions over the discrete cube
In this paper we consider bounded real-valued functions over the discrete cube, f : {-1, 1}n [-1, 1]. Such functions arise naturally in theoretical computer science, combinatorics...
Irit Dinur, Ehud Friedgut, Guy Kindler, Ryan O'Don...
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 8 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
IMC
2006
ACM
15 years 8 months ago
Quantifying path exploration in the internet
A number of previous measurement studies [10, 12, 17] have shown the existence of path exploration and slow convergence in the global Internet routing system, and a number of prot...
Ricardo V. Oliveira, Beichuan Zhang, Dan Pei, Rafi...
SIGITE
2005
ACM
15 years 7 months ago
A cross-collegiate analysis of software development course content
Many undergraduate IT programs recognize that their graduates will find jobs as software developers. As such, software development (analysis and design) courses are often a core r...
Timothy Burns, Robb Klashner