Sciweavers

4262 search results - page 795 / 853
» Internet and Intranet Computing
Sort
View
123
Voted
ATAL
2008
Springer
15 years 5 months ago
Anonymity-proof Shapley value: extending shapley value for coalitional games in open environments
Coalition formation is an important capability for automated negotiation among self-interested agents. In order for coalitions to be stable, a key question that must be answered i...
Naoki Ohta, Vincent Conitzer, Yasufumi Satoh, Atsu...
146
Voted
BALT
2008
15 years 5 months ago
Flexible Database Platform for Biomedical Research with Multiple User Interfaces and a Universal Query Engine
Biomedical research on human subjects often requires a large amount of data to be collected by personal interviews, Internet based questionnaires, lab measurements or by extracting...
Margus Jäger, Liina Kamm, Darja Krushevskaja,...
162
Voted
CASES
2005
ACM
15 years 5 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
159
Voted
ICDCS
2010
IEEE
15 years 5 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
146
Voted
CONEXT
2005
ACM
15 years 5 months ago
MRS: a simple cross-layer heuristic to improve throughput capacity in wireless mesh networks
Wireless Mesh Networks (WMNs) are an emerging architecture based on multi-hop transmission. ISPs considers WMNs as a potential future technology to offer broadband Internet acces...
Luigi Iannone, Serge Fdida