Sciweavers

1030 search results - page 131 / 206
» Happenings
Sort
View
CORR
2006
Springer
81views Education» more  CORR 2006»
14 years 11 months ago
The emergence of knowledge exchange: an agent-based model of a software market
Abstract--We investigate knowledge exchange among commercial organizations, the rationale behind it, and its effects on the market. Knowledge exchange is known to be beneficial for...
Maria Chli, Philippe De Wilde
34
Voted
CORR
2006
Springer
83views Education» more  CORR 2006»
14 years 11 months ago
An unlikely result
What happens to a dictator once he is out of power is not just a matter of justice or a random result. Using game theory we show that post-power scenarios depend largely on two fac...
A. N. Other
ENTCS
2006
80views more  ENTCS 2006»
14 years 11 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley
IJIIDS
2008
46views more  IJIIDS 2008»
14 years 11 months ago
Modelling an emergency vehicle early-warning system using real-time feedback
: Emergency vehicles, while usually equipped with warning sirens and/or beacons, are still often impeded by other traffic and involved in numerous collisions. An effective warning ...
Aline Senart, Mélanie Bouroche, Vinny Cahil...
CORR
2007
Springer
147views Education» more  CORR 2007»
14 years 11 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal