Sciweavers

10907 search results - page 239 / 2182
» Constraint Based Strategies
Sort
View
PKC
2005
Springer
109views Cryptology» more  PKC 2005»
15 years 4 months ago
Fast Multi-computations with Integer Similarity Strategy
Abstract. Multi-computations in finite groups, such as multiexponentiations and multi-scalar multiplications, are very important in ElGamallike public key cryptosystems. Algorithm...
Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih
INFOCOM
2003
IEEE
15 years 4 months ago
Probing strategies for distributed admission control in large and small scale systems
— The aim of this article is to propose and analyse measurement-based admission control schemes. We distinguish between large-scale and small-scale systems, where scale is measur...
Peter B. Key, Laurent Massoulié
APSEC
2007
IEEE
15 years 3 months ago
A Method for Early Requirements Triage and Selection Utilizing Product Strategies
In market-driven product development large numbers of requirements threaten to overload the development organization. It is critical for product management to select the requireme...
Mahvish Khurum, Khurum Aslam, Tony Gorschek
ATAL
2006
Springer
15 years 2 months ago
A novel method for automatic strategy acquisition in N-player non-zero-sum games
We present a novel method for automatically acquiring strategies for the double auction by combining evolutionary optimization together with a principled game-theoretic analysis. ...
Steve Phelps, Marek Marcinkiewicz, Simon Parsons
DEON
2006
Springer
15 years 2 months ago
A Question of Trust: Assessing the Fulfillment of Commitments in Terms of Strategies
We aim at an adequate formal description of the dynamics of commitments and trust by transferring insights about actual human practices to a formal setting. Our framework is based ...
Thomas Müller