Sciweavers

1068 search results - page 39 / 214
» Group Dominant Strategies
Sort
View
GROUP
2007
ACM
15 years 1 months ago
Creating, destroying, and restoring value in wikipedia
Wikipedia's brilliance and curse is that any user can edit any of the encyclopedia entries. We introduce the notion of the impact of an edit, measured by the number of times ...
Reid Priedhorsky, Jilin Chen, Shyong K. Lam, Kathe...
BIOTECHNO
2008
IEEE
15 years 4 months ago
Grouping Levels of Exposure with Same Observable Effects before Class Prediction in Toxicogenomics
—Gene expression profiling in toxicogenomics is often used to find molecular signature of toxicants. The range of doses chosen in toxicogenomics studies does not always represe...
Vincent Guillemot, Cathy Philippe, Arthur Tenenhau...
ACSAC
1999
IEEE
15 years 2 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
CLEIEJ
2008
88views more  CLEIEJ 2008»
14 years 9 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 3 months ago
Convergence of stochastic search algorithms to gap-free pareto front approximations
Recently, a convergence proof of stochastic search algorithms toward finite size Pareto set approximations of continuous multi-objective optimization problems has been given. The...
Oliver Schütze, Marco Laumanns, Emilia Tantar...