Sciweavers

889 search results - page 125 / 178
» A computational model of achievement motivation for artifici...
Sort
View
EUROCRYPT
2004
Springer
15 years 7 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
AAAI
2007
15 years 4 months ago
Simple Robots with Minimal Sensing: From Local Visibility to Global Geometry
We consider problems of geometric exploration and selfdeployment for simple robots that can only sense the combinatorial (non-metric) features of their surroundings. Even with suc...
Subhash Suri, Elias Vicari, Peter Widmayer
ALIFE
2008
15 years 1 months ago
The Embodiment of Cockroach Aggregation Behavior in a Group of Micro-robots
We report the faithful reproduction of the self-organized aggregation behavior of the German cockroach Blattella germanica with a group of robots. We describe the implementation of...
Simon Garnier, Christian Jost, Jacques Gautrais, M...
PERCOM
2011
ACM
14 years 5 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
SIGECOM
2005
ACM
169views ECommerce» more  SIGECOM 2005»
15 years 7 months ago
Online auctions with re-usable goods
This paper concerns the design of mechanisms for online scheduling in which agents bid for access to a re-usable resource such as processor time or wireless network access. Each a...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Mo...