Sciweavers

2092 search results - page 357 / 419
» A Theory of Non-Deterministic Networks
Sort
View
FOCS
2008
IEEE
15 years 4 months ago
On the Hardness of Being Truthful
The central problem in computational mechanism design is the tension between incentive compatibility and computational ef ciency. We establish the rst significant approximability ...
Christos H. Papadimitriou, Michael Schapira, Yaron...
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 4 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
ICC
2007
IEEE
15 years 4 months ago
On the Verification of the Gravity Model Used for Mobility Modeling
— Gravity model used to model transport flow has proven invaluable in urban planning. Some recent work has proposed to use gravity model to predict user movements in cellular net...
Yong Huat Chew, Shinobu Nanba, Peng Keong Tham, Bo...
ICDCS
2007
IEEE
15 years 4 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
IJCNN
2007
IEEE
15 years 4 months ago
Philosophical Aspects of Neural, Probabilistic and Fuzzy Modeling of Language Use and Translation
— Serious efforts to develop computerized systems for natural language understanding and machine translation have taken place for more than half a century. Some successful system...
Timo Honkela