Sciweavers

29046 search results - page 357 / 5810
» Computable Models
Sort
View
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
15 years 10 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai
UML
2005
Springer
15 years 10 months ago
Capturing Common and Variable Design Aspects for Ubiquitous Computing with MB-UID
Developing user interfaces for ubiquitous environments is a challenging task. In such an environment, users can apply different devices to accomplish the same or different tasks. ...
Alexander Boedcher, Kizito Mukasa, Detlef Zuelke
APPROX
2004
Springer
113views Algorithms» more  APPROX 2004»
15 years 10 months ago
Computationally-Feasible Truthful Auctions for Convex Bundles
In many economic settings, convex figures on the plane are for sale. For example, one might want to sell advertising space on a newspaper page. Selfish agents must be motivated ...
Moshe Babaioff, Liad Blumrosen
AMET
1998
Springer
15 years 9 months ago
Evolutionary Computing and Negotiating Agents
Automated negotiation has been of particular interest due to the relevant role that negotiation plays among trading agents. This paper presents two types of agent architecture: Cas...
Noyda Matos, Carles Sierra
AAAI
2008
15 years 7 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...