Sciweavers

7978 search results - page 1534 / 1596
» Combining shared-coin algorithms
Sort
View
SIGECOM
2003
ACM
115views ECommerce» more  SIGECOM 2003»
15 years 3 months ago
Betting boolean-style: a framework for trading in securities based on logical formulas
We develop a framework for trading in compound securities: financial instruments that pay off contingent on the outcomes of arbitrary statements in propositional logic. Buying o...
Lance Fortnow, Joe Kilian, David M. Pennock, Micha...
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
15 years 3 months ago
Solving combinatorial exchanges: optimality via a few partial bids
We investigate the problem of matching buyers and sellers in a multi-item multi-unit combinatorial exchange so as to maximize either the surplus (revenue minus cost) or the tradin...
Anshul Kothari, Tuomas Sandholm, Subhash Suri
SIGMETRICS
2003
ACM
199views Hardware» more  SIGMETRICS 2003»
15 years 3 months ago
Data cache locking for higher program predictability
Caches have become increasingly important with the widening gap between main memory and processor speeds. However, they are a source of unpredictability due to their characteristi...
Xavier Vera, Björn Lisper, Jingling Xue
VRST
2003
ACM
15 years 3 months ago
Tele-sports and tele-dance: full-body network interaction
Researchers have had great success using motion capture tools for controlling avatars in virtual worlds. Another current of virtual reality research has focused on building collab...
Benjamin Schaeffer, Mark Flider, Hank Kaczmarski, ...
WPES
2003
ACM
15 years 3 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
« Prev « First page 1534 / 1596 Last » Next »