Sciweavers

1260 search results - page 196 / 252
» Bipolar Preference Problems
Sort
View
ISCA
1994
IEEE
80views Hardware» more  ISCA 1994»
15 years 1 months ago
A Study of Single-Chip Processor/Cache Organizations for Large Numbers of Transistors
This paper presents an examination of different cache and processor configurations assuming transistor densities will continue to increase as they have in the past. While in the s...
Matthew K. Farrens, Gary S. Tyson, Andrew R. Plesz...
ECRIME
2007
15 years 1 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
EUROCRYPT
2007
Springer
15 years 1 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo
CIKM
2007
Springer
15 years 1 months ago
Satisfaction balanced mediation
We consider a distributed information system that allows autonomous consumers to query autonomous providers. We focus on the problem of query allocation from a new point of view, ...
Jorge-Arnulfo Quiané-Ruiz, Philippe Lamarre...
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
15 years 1 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes