Sciweavers

15636 search results - page 3114 / 3128
» Modelling by supersaturated designs
Sort
View
SIGECOM
2008
ACM
220views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Better redistribution with inefficient allocation in multi-unit auctions with unit demand
For the problem of allocating one or more items among a group of competing agents, the Vickrey-Clarke-Groves (VCG) mechanism is strategy-proof and efficient. However, the VCG mech...
Mingyu Guo, Vincent Conitzer
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
IJMMS
2007
195views more  IJMMS 2007»
14 years 9 months ago
Berlin Brain-Computer Interface - The HCI communication channel for discovery
The investigation of innovative Human–Computer Interfaces (HCI) provides a challenge for future interaction research and development. Brain–Computer Interfaces (BCIs) exploit ...
Roman Krepki, Gabriel Curio, Benjamin Blankertz, K...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
14 years 9 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
IJWIS
2007
153views more  IJWIS 2007»
14 years 9 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
« Prev « First page 3114 / 3128 Last » Next »