Sciweavers

671 search results - page 105 / 135
» On Observing and Constraining Active Systems
Sort
View
97
Voted
KESAMSTA
2009
Springer
15 years 7 months ago
An Approximate Model for Bidders in Sequential Automated Auctions
In this paper, we propose a probabilistic model to study the interaction of bidder and seller agents in sequential automated auctions. We consider a designated “special bidder”...
Erol Gelenbe, Kumaara Velan
106
Voted
PKDD
2009
Springer
94views Data Mining» more  PKDD 2009»
15 years 7 months ago
OTTHO: On the Tip of My THOught
In this paper we propose a system to solve a language game, called Guillotine, which requires a player with a strong cultural and linguistic background knowledge. The player obser...
Pierpaolo Basile, Marco Degemmis, Pasquale Lops, G...
108
Voted
ASWEC
2008
IEEE
15 years 7 months ago
An Empirical Study of Evolution of Inheritance in Java OSS
Previous studies of Object-Oriented (OO) software have reported avoidance of the inheritance mechanism and cast doubt on the wisdom of ‘deep’ inheritance levels. From an evolu...
Emal Nasseri, Steve Counsell, M. Shepperd
142
Voted
CDC
2008
IEEE
187views Control Systems» more  CDC 2008»
15 years 7 months ago
Controlled random access MAC for network utility maximization in wireless networks
— There has been much recent interest in protocol design for wireless networks based on maximizing a network utility function. A significant advance in recent years is the obser...
Robert J. McCabe, Nikolaos M. Freris, P. R. Kumar
NSPW
2006
ACM
15 years 6 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...