Sciweavers

500 search results - page 52 / 100
» On the Hardness of Being Truthful
Sort
View
CORR
2008
Springer
108views Education» more  CORR 2008»
14 years 12 months ago
Approximability and parameterized complexity of minmax values
Abstract. We consider approximating the minmax value of a multiplayer game in strategic form. Tightening recent bounds by Borgs et al., we observe that approximating the value with...
Kristoffer Arnsfelt Hansen, Thomas Dueholm Hansen,...
CORR
2007
Springer
94views Education» more  CORR 2007»
14 years 11 months ago
Size reduction of complex networks preserving modularity
The ubiquity of modular structure in real-world complex networks is being the focus of attention in many trials to understand the interplay between network topology and functionali...
Alex Arenas, J. Duch, A. Fernandez, Sergio G&oacut...
ITSSA
2006
129views more  ITSSA 2006»
14 years 11 months ago
A MultiAgent System for Classifying Bioinformatics Publications
Abstract. A growing amounts of information are currently being generated and stored in the World Wide Web (WWW), in particular, researchers in any field can find a lot of publicati...
Eloisa Vargiu, Andrea Addis
SIGMETRICS
2008
ACM
127views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Image management in a virtualized data center
Industrial research firms such as Gartner and IDC are predicting an explosion in the number of online services in the coming years. Virtualization technologies could play an impor...
Tingxi Tan, Rob Simmonds, Bradley Arlt, Martin F. ...
JCP
2007
127views more  JCP 2007»
14 years 11 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong