Sciweavers

692 search results - page 103 / 139
» Some research questions for computational transportation sci...
Sort
View
GI
2004
Springer
15 years 3 months ago
Quality Criteria for Competency Assignments: Examples from a Project Management Case Study
: We present several quality criteria for skills management initiatives based on the competence-performance approach [Kor97]. The criteria help to measure reliability and validity ...
Tobias Ley, Dietrich Albert
FOCS
2002
IEEE
15 years 2 months ago
Protocols and Impossibility Results for Gossip-Based Communication Mechanisms
In recent years, gossip-based algorithms have gained prominence as a methodology for designing robust and scalable communication schemes in large distributed systems. The premise ...
David Kempe, Jon M. Kleinberg
WM
2003
14 years 11 months ago
Radical Empiricism: Empirical Modelling and the nature of knowing
This paper explores connections between Radical Empiricism (RE), a philosophic attitude developed by William James at the beginning of the 20th century, and Empirical Modelling (E...
Meurig Beynon
TCS
2010
14 years 8 months ago
A polynomial solution to the k-fixed-endpoint path cover problem on proper interval graphs
: We study a variant of the path cover problem, namely, the k-fixed-endpoint path cover problem, or kPC for short. Given a graph G and a subset T of k vertices of V (G), a k-fixe...
Katerina Asdre, Stavros D. Nikolopoulos
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 3 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung