ผลต่างระหว่างรุ่นของ "Research reading list"

จาก Theory Wiki
ไปยังการนำทาง ไปยังการค้นหา
แถว 15: แถว 15:
 
* practice:   
 
* practice:   
 
* theory: [http://www.informatik.uni-trier.de/~ley/db/conf/colt/index.html COLT], [http://www.informatik.uni-trier.de/~ley/db/conf/alt/index.html ALT]
 
* theory: [http://www.informatik.uni-trier.de/~ley/db/conf/colt/index.html COLT], [http://www.informatik.uni-trier.de/~ley/db/conf/alt/index.html ALT]
 +
 +
'''Resources:'''
 +
* [http://hunch.net/~jl/projects/reductions/reductions.html Learning Reductions] by John Langford
  
 
==ทอป==
 
==ทอป==

รุ่นแก้ไขเมื่อ 06:25, 7 มีนาคม 2550

จุ่ง

โย

ณัฐ

papers:

  • John R. Douceur. 'The Sybil Attack.' (link)
  • Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman. 'SybilGuard: defending against sybil attacks via social networks'. SIGCOMM'06 (link)
  • Newsome, James, Elaine Shi, Dawn Song, and Adrian Perrig. 'The Sybil Attack in Sensor Networks: Analysis and Defenses.' In the Third International Symposium on Information Processing in Sensor Networks (IPSN), April, 2004. (link)

เป้

Conferences:

Resources:

ทอป

Conferences: RECOMB, WABI,CPM

Papers

  • Ozery-Flato and Shamir, 'An O(n^3/2\sqrt{log(n)}) Algorithm for Sorting by Reciprocal Translocations'. CPM'06. (link)
  • Eric Tannier and Marie-France Sagot, 'Sorting by Reversals in Subquadratic Time' CPM'06. (link)

อ๋อย