Sciweavers

754 search results - page 106 / 151
» Automated Model Selection Using Context-Dependent Behaviors
Sort
View
COCOON
2009
Springer
15 years 10 months ago
On the Performances of Nash Equilibria in Isolation Games
: Network games play a fundamental role in understanding behavior in many domains, ranging from communication networks through markets to social networks. Such networks are used, a...
Vittorio Bilò, Michele Flammini, Gianpiero ...
UIC
2009
Springer
15 years 10 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
CVPR
2008
IEEE
16 years 6 months ago
Spatio-temporal Saliency detection using phase spectrum of quaternion fourier transform
Salient areas in natural scenes are generally regarded as the candidates of attention focus in human eyes, which is the key stage in object detection. In computer vision, many mod...
Chenlei Guo, Qi Ma, Liming Zhang
ECOOP
2010
Springer
15 years 9 months ago
Correct Refactoring of Concurrent Java Code
Automated refactorings as implemented in modern IDEs for Java usually make no special provisions for concurrent code. Thus, refactored programs may exhibit unexpected new concurren...
Max Schäfer, Julian Dolby, Manu Sridharan, Em...
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes