Sciweavers

28962 search results - page 198 / 5793
» Computational Mechanism Design
Sort
View
IROS
2007
IEEE
138views Robotics» more  IROS 2007»
15 years 10 months ago
Gramian-based optimal design of a dynamic stroke amplifier compliant micro-mechanism
—This paper presents a new method developed for the optimal design of microrobotic compliant mechanisms. It is based on a flexible building block method, called FlexIn, which use...
Mathieu Grossard, Christine Rotinat-Libersa, Nicol...
IRI
2006
IEEE
15 years 10 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
DSRT
2008
IEEE
15 years 11 months ago
Design of Application-Specific Incentives in P2P Networks
A rational P2P node may decide not to provide a particular resource or to provide it with degraded quality. If nodes are very likely to behave this way, or if the failure of an P2...
Andrew Roczniak, Abdulmotaleb El-Saddik, Ross Kouh...
ESA
2008
Springer
195views Algorithms» more  ESA 2008»
15 years 6 months ago
A Characterization of 2-Player Mechanisms for Scheduling
We study the mechanism design problem of scheduling unrelated machines and we completely characterize the decisive truthful mechanisms for two players when the domain contains bot...
George Christodoulou, Elias Koutsoupias, Angelina ...
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 8 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson