Sciweavers

923 search results - page 181 / 185
» Simulating Social Phenomena
Sort
View
66
Voted
SIGMETRICS
1999
ACM
15 years 1 months ago
Availability and Utility of Idle Memory in Workstation Clusters
In this paper, we examine the availability and utility of idle memory in workstation clusters. We attempt to answer the following questions. First, how much of the total memory in...
Anurag Acharya, Sanjeev Setia
76
Voted
ROBOCUP
1999
Springer
115views Robotics» more  ROBOCUP 1999»
15 years 1 months ago
UBU Team
The underlying research topics and the architecture of the UBU team are briefly described. The aim of developing UBU is to subject a series of tools and procedures for agent decis...
Johan Kummeneje, David Lybäck, Håkan L....
106
Voted
VL
1996
IEEE
117views Visual Languages» more  VL 1996»
15 years 1 months ago
Tactile Programming: A Unified Manipulation Paradigm Supporting Program Comprehension, Composition and Sharing
Although visual programming techniques have been used to lower the threshold of programming for end users, they are not sufficient for creating end user programming environments t...
Alexander Repenning, James Ambach
74
Voted
ACMICEC
2007
ACM
148views ECommerce» more  ACMICEC 2007»
15 years 1 months ago
Pricing digital content with DRM mechanism
The Internet and file sharing technology (such as P2P network) significantly alleviate the content distribution cost. However, better digital content distribution also means that ...
Yung-Ming Li, Chia-Hao Lin
ATAL
2003
Springer
15 years 1 months ago
A false-name-proof double auction protocol for arbitrary evaluation values
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategyproofness...
Yuko Sakurai, Makoto Yokoo