Sciweavers

904 search results - page 153 / 181
» Game Theory
Sort
View
84
Voted
APPROX
2009
Springer
142views Algorithms» more  APPROX 2009»
15 years 4 months ago
Truthful Mechanisms via Greedy Iterative Packing
An important research thread in algorithmic game theory studies the design of efficient truthful mechanisms that approximate the optimal social welfare. A fundamental question is ...
Chandra Chekuri, Iftah Gamzu
79
Voted
ISAAC
2009
Springer
114views Algorithms» more  ISAAC 2009»
15 years 4 months ago
Good Programming in Transactional Memory
Abstract. In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a progra...
Raphael Eidenbenz, Roger Wattenhofer
69
Voted
CDC
2008
IEEE
103views Control Systems» more  CDC 2008»
15 years 4 months ago
Symbolic models for nonlinear control systems affected by disturbances
Abstract— Symbolic models are abstract descriptions of continuous systems in which symbols represent aggregates of continuous states. In the last few years there has been a growi...
Giordano Pola, Paulo Tabuada
HICSS
2008
IEEE
150views Biometrics» more  HICSS 2008»
15 years 4 months ago
Quantitative Early-Phase User Research Methods: Hard Data for Initial Product Design
We describe questions that commonly arise in early-phase user research for new technology products concerning customer needs, priorities, and market definition. We suggest that me...
Christopher N. Chapman, Edwin Love, James L. Alfor...
INFOCOM
2007
IEEE
15 years 3 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras