Sciweavers

2652 search results - page 418 / 531
» Privacy-preserving linear programming
Sort
View
HICSS
2003
IEEE
120views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Primitive Study of Logrolling in e-Negotiation
e-Negotiation involves two or more agents multilaterally bargaining for mutual gain, using information technologies in a cooperative problem-solving (CPS) environment. This paper ...
Patrick C. K. Hung
ICCAD
2003
IEEE
129views Hardware» more  ICCAD 2003»
15 years 3 months ago
Performance Optimization of Latency Insensitive Systems Through Buffer Queue Sizing of Communication Channels
This paper proposes for latency insensitive systems a performance optimization technique called channel buffer queue sizing, which is performed after relay station insertion in th...
Ruibing Lu, Cheng-Kok Koh
VTS
2003
IEEE
115views Hardware» more  VTS 2003»
15 years 3 months ago
Fault Testing for Reversible Circuits
Irreversible computation necessarily results in energy dissipation due to information loss. While small in comparison to the power consumption of today’s VLSI circuits, if curre...
Ketan N. Patel, John P. Hayes, Igor L. Markov
WECWIS
2003
IEEE
118views ECommerce» more  WECWIS 2003»
15 years 3 months ago
Trade Determination in Multi-Attribute Exchanges
Electronic exchanges are double-sided marketplaces that allow multiple buyers to trade with multiple sellers, with aggregation of demand and supply across the bids to maximize the...
S. Kameshwaran, Y. Narahari
SIGSOFT
2003
ACM
15 years 3 months ago
Fluent model checking for event-based systems
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
Dimitra Giannakopoulou, Jeff Magee