Sciweavers

73 search results - page 9 / 15
» Efficiency loss and uniform-price mechanism
Sort
View
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
15 years 4 months ago
Architectural support for low overhead detection of memory violations
Violations in memory references cause tremendous loss of productivity, catastrophic mission failures, loss of privacy and security, and much more. Software mechanisms to detect me...
Saugata Ghose, Latoya Gilgeous, Polina Dudnik, Ane...
JSAC
2008
101views more  JSAC 2008»
14 years 10 months ago
Sequential Bandwidth and Power Auctions for Distributed Spectrum Sharing
We study a sequential auction for sharing a wireless resource (bandwidth or power) among competing transmitters. The resource is assumed to be managed by a spectrum broker (auction...
Junjik Bae, Eyal Beigman, Randall A. Berry, Michae...
SCN
2004
Springer
112views Communications» more  SCN 2004»
15 years 3 months ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg
HICSS
2007
IEEE
96views Biometrics» more  HICSS 2007»
15 years 4 months ago
Enhancing Workflow Automation in Insurance Underwriting Processes with Web Services and Alerts
Underwriting is one of the important processes in insurance operations. The applicant's information, including various kinds of medical information, must be evaluated before ...
Raymond C. M. Lee, Kai-Pan Mark, Dickson K. W. Chi...
INFOCOM
1993
IEEE
15 years 2 months ago
Experimental Assessment of End-to-End Behavior on Internet
Over the last decade Internet has grown by orders of magnitude in size. Many of the protocols that were designed several years ago are still in use. It is not clear if the assumpt...
Dheeraj Sanghi, Ashok K. Agrawala, Olafur Gudmunds...