Sciweavers

10910 search results - page 2059 / 2182
» Input modeling using a computer algebra system
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 4 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
CG
2000
Springer
15 years 2 months ago
Chess Neighborhoods, Function Combination, and Reinforcement Learning
Abstract. Over the years, various research projects have attempted to develop a chess program that learns to play well given little prior knowledge beyond the rules of the game. Ea...
Robert Levinson, Ryan Weber
ICDCS
1995
IEEE
15 years 1 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
NSDI
2007
15 years 7 days ago
An Experimentation Workbench for Replayable Networking Research
The network and distributed systems research communities have an increasing need for “replayable” research, but our current experimentation resources fall short of reaching th...
Eric Eide, Leigh Stoller, Jay Lepreau
CSFW
2004
IEEE
15 years 1 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
« Prev « First page 2059 / 2182 Last » Next »