Sciweavers

3130 search results - page 32 / 626
» Collusion without communication
Sort
View
CIA
2001
Springer
15 years 4 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
UIST
1997
ACM
15 years 3 months ago
Systematic Output Modification in a 2D User Interface Toolkit
In this paper we present a simple but general set of techniques for modifying output in a 2D user interface toolkit. We use a combination of simple subclassing, wrapping, and coll...
W. Keith Edwards, Scott E. Hudson, Joshua Marinacc...
AAAI
2007
15 years 2 months ago
PhotoSlap: A Multi-player Online Game for Semantic Annotation
Multimedia content presents special challenges for the search engines, and could benefit from semantic annotation of images. Unfortunately, manual labeling is too tedious and tim...
Chien-Ju Ho, Tsung-Hsiang Chang, Jane Yung-jen Hsu
MOBISYS
2007
ACM
15 years 11 months ago
Improving mobile database access over wide-area networks without degrading consistency
We report on the design, implementation, and evaluation of a system called Cedar that enables mobile database access with good performance over low-bandwidth networks. This is acc...
Niraj Tolia, Mahadev Satyanarayanan, Adam Wolbach
SAC
2010
ACM
15 years 6 months ago
Maintaining data reliability without availability in P2P storage systems
Peer-to-peer (P2P) storage is a promising technology to provide users with cheap and online persistence. However, due the instability of these infrastructures, P2P storage systems...
Lluis Pamies-Juarez, Pedro García Ló...