The zeta function on the critical line: Numerical evidence for moments and random matrix theory models. | 1 | 0.43 | 2012 |
Internet Predictions | 5 | 0.47 | 2010 |
Social networks and mathematical models: A research commentary on "Critical Mass and Willingness to Pay for Social Networks" by J. Christopher Westland | 0 | 0.34 | 2010 |
Providing security with insecure systems | 6 | 1.00 | 2010 |
Bubbles, gullibility, and other challenges for economics, psychology, sociology, and information sciences | 0 | 0.34 | 2010 |
Economics and technology in the evolution of networks | 0 | 0.34 | 2008 |
Digital rights management: desirable, inevitable, and almost irrelevant | 0 | 0.34 | 2007 |
Privacy, economics, and price discrimination on the Internet | 3 | 0.38 | 2004 |
The many paradoxes of broadband | 4 | 1.96 | 2003 |
Economics, Psychology, and Sociology of Security | 15 | 1.03 | 2003 |
The Case Against Micropayments | 13 | 1.95 | 2003 |
Does Anyone Really Need MicroPayments? | 6 | 0.70 | 2003 |
Internet pricing and the history of communications | 76 | 7.02 | 2001 |
Content is Not King | 12 | 3.14 | 2001 |
Dynamic behavior of differential pricing and quality of service options for the internet | 52 | 15.88 | 2000 |
Integer Factorization and Discrete Logarithms (Abstract) | 0 | 0.34 | 2000 |
Keynote Talk: Internet Charging | 0 | 0.34 | 2000 |
Discrete Logarithms: The Past and the Future | 53 | 7.23 | 2000 |
Competition and cooperation: Libraries and publishers in the transition to electronic scholarly journals | 8 | 1.86 | 1999 |
The Asymptotic Number of Set Partitions with Unequal Block Sizes | 3 | 0.66 | 1999 |
The Visible Problems of the Invisible Computer: A Skeptical Look at Information Appliances | 6 | 1.24 | 1999 |
An Optimal Acceptance Policy for an Urn Scheme | 2 | 0.56 | 1998 |
Silicon Dreams and Silicon Bricks: The Continuing Evolution of Libraries | 6 | 3.12 | 1997 |
Monotonic subsequences in dimensions higher than one | 1 | 1.22 | 1997 |
An Efficient Micropayment System Based on Probabilistic Polling | 23 | 5.52 | 1997 |
Fixed fee versus unit pricing for information goods: competition, equilibria, and price wars | 29 | 8.82 | 1997 |
The slow evolution of electronic publishing | 9 | 3.04 | 1997 |
The Economics Of Electronic Journals | 30 | 5.89 | 1997 |
Computer Algebra and its Applications: Where are we Going? | 0 | 0.34 | 1996 |
The bumpy road of Electronic Commerce | 11 | 11.08 | 1996 |
Short Proofs for Nondivisibility of Sparse Polynomials under the Extended Riemann | 0 | 0.34 | 1996 |
Fast parallel solution of fixed point equations for the performance evaluation of circuit-switched networks | 1 | 0.56 | 1994 |
Minimal-Distance Routing For Kyklos-Ii | 0 | 0.34 | 1994 |
Tragic loss or good riddance? The impending demise of traditional scholarly journals | 53 | 15.87 | 1994 |
The Distribution of Heights of Binary Trees and Other Simple Trees | 13 | 1.61 | 1993 |
Improved low-density subset sum algorithms | 123 | 14.34 | 1992 |
Existence of short proofs for nondivisibility of sparse polynomials under the extended Riemann hypothesis | 2 | 0.40 | 1992 |
The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel) | 2 | 0.83 | 1992 |
An improved low-density subset sum algorithm | 44 | 4.47 | 1991 |
Singularity Analysis Of Generating-Functions | 305 | 37.38 | 1990 |
Computation of Discrete Logarithms in Prime Fields (Extended Abstract) | 2 | 0.63 | 1990 |
Random mapping statistics | 80 | 19.18 | 1989 |
On subspaces spanned by random selections of ±1 vectors | 2 | 0.54 | 1988 |
Decreasing energy functions and lengths of transients for some cellular automata | 2 | 1.03 | 1988 |
Simple, efficient, asynchronous parallel algorithms for maximization | 1 | 0.42 | 1988 |
Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings | 24 | 85.67 | 1987 |
Computing pi(x): An Analytic Method | 2 | 0.54 | 1987 |
k-Color Sperner theorems | 4 | 1.82 | 1986 |
Discrete logarithms in GF(p) | 121 | 92.51 | 1986 |
Constant time generation of free trees | 40 | 6.88 | 1986 |