Sciweavers

43264 search results - page 8412 / 8653
» Comparing models of computation
Sort
View
129
Voted
SIGECOM
2011
ACM
216views ECommerce» more  SIGECOM 2011»
14 years 1 months ago
Strategic sequential voting in multi-issue domains and multiple-election paradoxes
In many settings, a group of agents must come to a joint decision on multiple issues. In practice, this is often done by voting on the issues in sequence. In this paper, we model ...
Lirong Xia, Vincent Conitzer, Jérôme ...
ALDT
2011
Springer
251views Algorithms» more  ALDT 2011»
13 years 10 months ago
Game Theory and Human Behavior: Challenges in Security and Sustainability
Security and sustainability are two critical global challenges that involve the interaction of many intelligent actors. Game theory provides a sound mathematical framework to model...
Rong Yang, Milind Tambe, Manish Jain, Jun-young Kw...
126
Voted
ASAP
2011
IEEE
233views Hardware» more  ASAP 2011»
13 years 10 months ago
Accelerating vision and navigation applications on a customizable platform
—The domain of vision and navigation often includes applications for feature tracking as well as simultaneous localization and mapping (SLAM). As these problems require computati...
Jason Cong, Beayna Grigorian, Glenn Reinman, Marco...
CIKM
2011
Springer
13 years 10 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier
CSFW
2011
IEEE
13 years 10 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
« Prev « First page 8412 / 8653 Last » Next »