Sciweavers

5544 search results - page 927 / 1109
» Three Inadequate Models
Sort
View
131
Voted
SCIENTOMETRICS
2010
109views more  SCIENTOMETRICS 2010»
15 years 1 months ago
To publish or not to publish? On the aggregation and drivers of research performance
This paper presents a methodology to aggregate multidimensional research output. Using a tailored version of the non-parametric Data Envelopment Analysis model, we account for the...
Kristof De Witte, Nicky Rogge
SCN
2010
Springer
145views Communications» more  SCN 2010»
15 years 1 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
142
Voted
SOSYM
2010
107views more  SOSYM 2010»
15 years 1 months ago
A UML/OCL framework for the analysis of graph transformation rules
In this paper we present an approach for the analysis of graph transformation rules based on an intermediate OCL representation. We translate different rule semantics into OCL, to...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
144
Voted
SSPR
2010
Springer
15 years 1 months ago
A Psychophysical Evaluation of Texture Degradation Descriptors
Delivering digitally a realistic appearance of materials is one of the most difficult tasks of computer vision. Accurate representation of surface texture can be obtained by means ...
Jirí Filip, Pavel Vácha, Michal Hain...
137
Voted
TCS
2010
15 years 1 months ago
Maximum likelihood analysis of algorithms and data structures
We present a new approach for an average-case analysis of algorithms and data structures that supports a non-uniform distribution of the inputs and is based on the maximum likelih...
Ulrich Laube, Markus E. Nebel