Sciweavers

3428 search results - page 627 / 686
» Making the Case
Sort
View
97
Voted
ATAL
2003
Springer
15 years 1 months ago
A false-name-proof double auction protocol for arbitrary evaluation values
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategyproofness...
Yuko Sakurai, Makoto Yokoo
CCGRID
2001
IEEE
15 years 1 months ago
An Adaptive, Reconfigurable Interconnect for Computational Clusters
This paper describes the principles of an original adaptive interconnect for a computational cluster. Torus topology (2d or 3d) is used as a basis but nodes are allowed to effecti...
Alexander V. Shafarenko, Vladimir Vasekin
124
Voted
HPCN
2000
Springer
15 years 1 months ago
An Analytical Model for a Class of Architectures under Master-Slave Paradigm
We build an analytical model for an application utilizing master-slave paradigm. In the model, only three architecture parameters are used: latency, bandwidth and flop rate. Instea...
Yasemin Yalçinkaya, Trond Steihaug
IDMS
2000
Springer
128views Multimedia» more  IDMS 2000»
15 years 1 months ago
Fast and Optimal Multicast-Server Selection Based on Receivers' Preference
Abstract. In this paper, we propose static and dynamic server selection techniques for multicast receivers who receive multiple streams from replicated servers. In the proposed sta...
Akihito Hiromori, Hirozumi Yamaguchi, Keiichi Yasu...
71
Voted
JELIA
2000
Springer
15 years 1 months ago
An Algorithmic Approach to Recover Inconsistent Knowledge-Bases
Abstract. We consider an algorithmic approach for revising inconsistent data and restoring its consistency. This approach detects the\spoiled" part of the data (i.e., the set ...
Ofer Arieli