Sciweavers

9425 search results - page 1772 / 1885
» Some Notes on Models and Modelling
Sort
View
108
Voted
MOBILITY
2009
ACM
15 years 8 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
RECSYS
2009
ACM
15 years 8 months ago
Ordering innovators and laggards for product categorization and recommendation
Different buyers exhibit different purchasing behaviors. Some rush to purchase new products while others tend to be more cautious, waiting for reviews from people they trust. In...
Sarah K. Tyler, Shenghuo Zhu, Yun Chi, Yi Zhang
108
Voted
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 8 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
ACSC
2008
IEEE
15 years 8 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
102
Voted
CDC
2008
IEEE
109views Control Systems» more  CDC 2008»
15 years 8 months ago
MPC for tracking with optimal closed-loop performance
— This paper deals with the tracking problem for constrained linear systems using a model predictive control (MPC) law. As it is well known, MPC provides a control law suitable f...
Antonio Ferramosca, Daniel Limón, Ignacio A...
« Prev « First page 1772 / 1885 Last » Next »