Sciweavers

950 search results - page 189 / 190
» presence 2008
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 4 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 4 months ago
Binding bigraphs as symmetric monoidal closed theories
Milner's bigraphs [1] are a general framework for reasoning about distributed and concurrent programming languages. Notably, it has been designed to encompass both the -calcul...
Tom Hirschowitz, Aurélien Pardon
CORR
2008
Springer
73views Education» more  CORR 2008»
13 years 4 months ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus
EC
2008
116views ECommerce» more  EC 2008»
13 years 4 months ago
Efficient Evaluation Functions for Evolving Coordination
Abstract-- This paper presents a method for creating evaluation functions that efficiently promote coordination in a multiagent system, allowing single-agent evolutionary computati...
Adrian K. Agogino, Kagan Tumer
KI
2008
Springer
13 years 4 months ago
Wayfinding in Scene Space
Many environments in which humans wayfind can be conveniently abstracted as networks or graphs: structures of nodes that are interconnected by edges. Examples include the street ne...
Urs-Jakob Rüetschi