We investigate the class of single-round, sealed-bid auctions for a set of identical items in unlimited supply. We adopt the worst-case competitive framework defined by [8, 4] th...
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Abstract. Reactive systems are often modelled as two person antagonistic games where one player represents the system while his adversary represents the environment. Undoubtedly, t...
DarGridⅡ is an implemented database gird system whose goal is to provide a semantic solution for integrating database resources on the web. Although many algorithms have been pro...
Xiaoqing Zheng, Huajun Chen, Zhaohui Wu, Yuxin Mao
With the advent of efficient techniques for multi-objective evolutionary optimization (EMO), real-world search and optimization problems are being increasingly solved for mulitple ...