Sciweavers

36320 search results - page 7174 / 7264
» From Code to Models
Sort
View
130
Voted
ESORICS
2010
Springer
15 years 3 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
HPDC
2010
IEEE
15 years 3 months ago
Software architecture definition for on-demand cloud provisioning
Cloud computing [22] is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitat...
Clovis Chapman, Wolfgang Emmerich, Fermín G...
136
Voted
FOCS
2008
IEEE
15 years 3 months ago
Market Equilibria in Polynomial Time for Fixed Number of Goods or Agents
We consider markets in the classical Arrow-Debreu model. There are n agents and m goods. Each buyer has a concave utility function (of the bundle of goods he/she buys) and an init...
Nikhil R. Devanur, Ravi Kannan
AAI
2007
132views more  AAI 2007»
15 years 3 months ago
Incremental Extraction of Association Rules in Applicative Domains
In recent years, the KDD process has been advocated to be an iterative and interactive process. It is seldom the case that a user is able to answer immediately with a single query...
Arianna Gallo, Roberto Esposito, Rosa Meo, Marco B...
AAMAS
2008
Springer
15 years 3 months ago
Automated organization design for multi-agent systems
The ability to create effective multi-agent organizations is key to the development of larger, more diverse multi-agent systems. In this article we present KB-ORG: a fully automate...
Mark Sims, Daniel D. Corkill, Victor R. Lesser
« Prev « First page 7174 / 7264 Last » Next »