Sciweavers

949 search results - page 30 / 190
» exact 2008
Sort
View
DM
2008
104views more  DM 2008»
14 years 10 months ago
On edge-weighted recursive trees and inversions in random permutations
We introduce random recursive trees, where deterministically weights are attached to the edges according to the labeling of the trees. We will give a bijection between recursive t...
Markus Kuba, Alois Panholzer
ENDM
2008
101views more  ENDM 2008»
14 years 10 months ago
A central approach to bound the number of crossings in a generalized configuration
A generalized configuration is a set of n points and n 2 pseudolines such that each pseudoline passes through exactly two points, two pseudolines intersect exactly once, and no th...
Bernardo M. Ábrego, Silvia Fernández...
DI
2006
156views more  DI 2006»
14 years 10 months ago
Identifying almost identical files using context triggered piecewise hashing
Fuzzy hashing allows the discovery of potentially incriminating documents that may not be located using traditional hashing methods. The use of the fuzzy hash is much like the fuz...
Jesse D. Kornblum
JUCS
2008
91views more  JUCS 2008»
14 years 10 months ago
The Riemann Integral in Weak Systems of Analysis
: Taking as a starting point (a modification of) a weak theory of arithmetic of Jan Johannsen and Chris Pollett (connected with the hierarchy of counting functions), we introduce s...
Fernando Ferreira, Gilda Ferreira
ETFA
2008
IEEE
14 years 11 months ago
Preamble detection for wireless clock synchronization in frequency selective fading channels
Exact client localization has been an obstacle in the use of WLAN in factories and offices for providing location based service. With respect to a novel localization scheme in WLA...
Aneeq Mahmood, Georg Gaderer