Sciweavers

166 search results - page 20 / 34
» Black-Box Randomized Reductions in Algorithmic Mechanism Des...
Sort
View
106
Voted
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 1 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
SIGECOM
2003
ACM
107views ECommerce» more  SIGECOM 2003»
15 years 5 months ago
Using value queries in combinatorial auctions
Combinatorial auctions, where bidders can bid on bundles of items are known to be desirable auction mechanisms for selling items that are complementary and/or substitutable. Howev...
Benoît Hudson, Tuomas Sandholm
ICDCS
2005
IEEE
15 years 5 months ago
On Exploring Channel Allocation in the Diverse Data Broadcasting Environment
In recent years, data broadcasting becomes a promising technique to design a mobile information system with power conservation, high scalability and high bandwidth utilization. Ho...
Hao-Ping Hung, Ming-Syan Chen
MOBIHOC
2012
ACM
13 years 2 months ago
Spatial spectrum access game: nash equilibria and distributed learning
A key feature of wireless communications is the spatial reuse. However, the spatial aspect is not yet well understood for the purpose of designing efficient spectrum sharing mecha...
Xu Chen, Jianwei Huang
SAC
2010
ACM
15 years 6 months ago
Asynchronous Byzantine consensus with 2f+1 processes
Byzantine consensus in asynchronous message-passing systems has been shown to require at least 3f + 1 processes to be solvable in several system models (e.g., with failure detecto...
Miguel Correia, Giuliana Santos Veronese, Lau Cheu...