Sciweavers

8512 search results - page 173 / 1703
» Computing Theory With Relevance
Sort
View
DSN
2011
IEEE
14 years 4 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
128
Voted
SEMCO
2008
IEEE
15 years 11 months ago
Applications of Voting Theory to Information Mashups
Blogs, discussion forums and social networking sites are an excellent source for people’s opinions on a wide range of topics. We examine the application of voting theory to “I...
Alfredo Alba, Varun Bhagwan, Julia Grace, Daniel G...
AINA
2007
IEEE
15 years 11 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
151
Voted
SMA
2008
ACM
192views Solid Modeling» more  SMA 2008»
15 years 3 months ago
Identification of sections from engineering drawings based on evidence theory
View identification is the basal process for solid reconstruction from engineering drawings. A new method is presented to label various views from a section-involved drawing and i...
Jie-Hui Gong, Hui Zhang, Bin Jiang, Jia-Guang Sun
ICALP
2004
Springer
15 years 10 months ago
Towards an Algebraic Theory of Typed Mobile Processes
The impact of types on the algebraic theory of the π-calculus is studied. The type system has capability types. They allow one to distinguish between the ability to read from a c...
Yuxin Deng, Davide Sangiorgi