Sciweavers

7434 search results - page 132 / 1487
» Still
Sort
View
CORR
2010
Springer
66views Education» more  CORR 2010»
15 years 4 months ago
Solutions to the GSM Security Weaknesses
Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
141views Education» more  CORR 2010»
15 years 4 months ago
Agnostic Active Learning Without Constraints
We present and analyze an agnostic active learning algorithm that works without keeping a version space. This is unlike all previous approaches where a restricted set of candidate...
Alina Beygelzimer, Daniel Hsu, John Langford, Tong...
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 4 months ago
Compound Node-Kayles on Paths
In his celebrated book On Numbers and Games (Academic Press, New-York, 1976), J. H. Conway introduced twelve versions of compound games. We analyze these twelve versions for the N...
Adrien Guignard, Eric Sopena
CORR
2008
Springer
64views Education» more  CORR 2008»
15 years 4 months ago
Constructing word similarities in Meroitic as an aid to decipherment
: Meroitic is the still undeciphered language of the ancient civilization of Kush. Over the years, various techniques for decipherment such as finding a bilingual text or cognates ...
Reginald D. Smith
DM
2010
66views more  DM 2010»
15 years 4 months ago
Two proofs of the Bermond-Thomassen conjecture for tournaments with bounded minimum in-degree
The Bermond-Thomassen conjecture states that, for any positive integer r, a digraph of minimum out-degree at least 2r -1 contains at least r vertex-disjoint directed cycles. Thoma...
Stéphane Bessy, Nicolas Lichiardopol, Jean-...