Sciweavers

884 search results - page 85 / 177
» Granularity as a Parameter of Context
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Using Repeated Games to Design Incentive-Based Routing Systems
Abstract— Incorporating pricing information in routing systems has been explored in various contexts and fashions. In this paper we examine certain fundamental properties importa...
Michael Afergan
MIAR
2006
IEEE
15 years 3 months ago
Robust Click-Point Linking for Longitudinal Follow-Up Studies
This paper proposes a novel framework for robust click-point linking: efficient localized registration that allows users to interactively prescribe where the accuracy has to be hig...
Kazunori Okada, Xiaolei Huang, Xiang Zhou, Arun Kr...
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
RAID
2005
Springer
15 years 3 months ago
Empirical Analysis of Rate Limiting Mechanisms
One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting t...
Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi W...
COLT
2004
Springer
15 years 3 months ago
Replacing Limit Learners with Equally Powerful One-Shot Query Learners
Different formal learning models address different aspects of human learning. Below we compare Gold-style learning—interpreting learning as a limiting process in which the lear...
Steffen Lange, Sandra Zilles