Sciweavers

663 search results - page 86 / 133
» PKI design for the real world
Sort
View
WINE
2009
Springer
111views Economy» more  WINE 2009»
15 years 6 months ago
Prediction Mechanisms That Do Not Incentivize Undesirable Actions
A potential downside of prediction markets is that they may incentivize agents to take undesirable actions in the real world. For example, a prediction market for whether a terrori...
Peng Shi, Vincent Conitzer, Mingyu Guo
ICANNGA
2009
Springer
212views Algorithms» more  ICANNGA 2009»
15 years 6 months ago
Evolutionary Regression Modeling with Active Learning: An Application to Rainfall Runoff Modeling
Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a feasible alte...
Ivo Couckuyt, Dirk Gorissen, Hamed Rouhani, Eric L...
MDAI
2009
Springer
15 years 6 months ago
A Consensus Reaching Model for Web 2.0 Communities
Web 2.0 Communities allow large amounts of users to interact with each others. In fact, new Web 2.0 technologies allow to share resources and information in an easy and timely mann...
Sergio Alonso, Ignacio J. Pérez, Francisco ...
SAFECOMP
2009
Springer
15 years 6 months ago
Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control
The behaviour of control functions in safety critical software systems is typically bounded to prevent the occurrence of known system level hazards. These bounds are typically deri...
Zeshan Kurd, Tim Kelly, John A. McDermid, Radu Cal...
CBMS
2008
IEEE
15 years 6 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...