Sciweavers

395 search results - page 62 / 79
» Positive Versions of Polynomial Time
Sort
View
FC
1998
Springer
96views Cryptology» more  FC 1998»
15 years 2 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 10 months ago
Capacitated Caching Games
Capacitated Caching (CC) Games are motivated by P2P and web caching applications, and involve nodes on a network making strategic choices regarding the content to replicate in the...
Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Na...
ICDT
2010
ACM
195views Database» more  ICDT 2010»
15 years 1 months ago
Answering Non-Monotonic Queries in Relational Data Exchange
Relational data exchange deals with translating a relational database instance over some source schema into a relational database instance over some target schema, according to a ...
André Hernich
TON
2010
197views more  TON 2010»
14 years 8 months ago
Constrained relay node placement in wireless sensor networks: formulation and approximations
—One approach to prolong the lifetime of a wireless sensor network (WSN) is to deploy some relay nodes to communicate with the sensor nodes, other relay nodes, and the base stati...
Satyajayant Misra, Seung Don Hong, Guoliang Xue, J...
JOCN
2010
107views more  JOCN 2010»
14 years 8 months ago
Rapid Detection of Emotion from Human Vocalizations
■ The rapid detection of affective signals from conspecifics is crucial for the survival of humans and other animals; if those around you are scared, there is reason for you to ...
Disa Anna Sauter, Martin Eimer