Sciweavers

6432 search results - page 161 / 1287
» Classic Mechanism Design
Sort
View
133
Voted
SPC
2005
Springer
15 years 6 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
GECCO
2004
Springer
211views Optimization» more  GECCO 2004»
15 years 6 months ago
Adaptive and Evolvable Network Services
This paper proposes an evolutionary framework where a network service is created from a group of autonomous agents that interact and evolve. Agents in our framework are capable of ...
Tadashi Nakano, Tatsuya Suda
91
Voted
MICRO
2009
IEEE
120views Hardware» more  MICRO 2009»
15 years 7 months ago
Tribeca: design for PVT variations with local recovery and fine-grained adaptation
With continued advances in CMOS technology, parameter variations are emerging as a major design challenge. Irregularities during the fabrication of a microprocessor and variations...
Meeta Sharma Gupta, Jude A. Rivers, Pradip Bose, G...
ACMICEC
2007
ACM
168views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Designing novel review ranking systems: predicting the usefulness and impact of reviews
With the rapid growth of the Internet, users' ability to publish content has created active electronic communities that provide a wealth of product information. Consumers nat...
Anindya Ghose, Panagiotis G. Ipeirotis
88
Voted
MSWIM
2009
ACM
15 years 7 months ago
Designing an asynchronous group communication middleware for wireless users
We evaluate an asynchronous gossiping middleware for wireless users that propagates messages from any group member to all the other group members. This propagation can either be i...
Xuwen Yu, Surendar Chandra