Sciweavers

11862 search results - page 267 / 2373
» Relative information completeness
Sort
View
IAT
2008
IEEE
15 years 11 months ago
Characterizing the Outcomes of Argumentation-Based Integrative Negotiation
In the negotiation literature we find two relatively distinct types of negotiation. The two types are known as integrative negotiations and distributive negotiations. Integrative...
Yannis Dimopoulos, Pavlos Moraitis, Leila Amgoud
GLOBECOM
2007
IEEE
15 years 10 months ago
Sensing Workload Scheduling in Sensor Networks Using Divisible Load Theory
Abstract— This paper presents scheduling strategies for sensing workload in wireless sensor networks using Divisible Load Theory (DLT), which offers a tractable model and realist...
Xiaolin Li, Xinxin Liu, Hui Kang
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 10 months ago
On the Development of an Internetwork-Centric Defense for Scanning Worms
Studies of worm outbreaks have found that the speed of worm propagation makes manual intervention ineffective. Consequently, many automated containment mechanisms have been propos...
Scott E. Coull, Boleslaw K. Szymanski
WADS
2007
Springer
140views Algorithms» more  WADS 2007»
15 years 10 months ago
A Stab at Approximating Minimum Subadditive Join
Let (L, ∗) be a semilattice, and let c : L → [0, ∞) be monotone and increasing on L. We state the Minimum Join problem as: given size n sub-collection X of L and integer k w...
Staal A. Vinterbo
NSPW
2006
ACM
15 years 10 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann