Sciweavers

272 search results - page 16 / 55
» Some Representation and Computational Issues in Social Choic...
Sort
View
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 6 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
GW
2003
Springer
182views Biometrics» more  GW 2003»
15 years 5 months ago
A Procedure for Developing Intuitive and Ergonomic Gesture Interfaces for HCI
Many disciplines of multimedia and communication go towards ubiquitous computing and hands free- or no-touch interaction with computers. Application domains in this direction invol...
Michael Nielsen, Moritz Störring, Thomas B. M...
ASSETS
2009
ACM
15 years 6 months ago
Comparing evaluation techniques for text readability software for adults with intellectual disabilities
In this paper, we compare alternative techniques for evaluating a software system for simplifying the readability of texts for adults with mild intellectual disabilities (ID). We ...
Matt Huenerfauth, Lijun Feng, Noemie Elhadad
ATAL
2005
Springer
15 years 5 months ago
Negotiating over small bundles of resources
When rational but myopic agents negotiate over the exchange of indivisible resources, any restriction to the negotiation protocol may prevent the system from converging to a socia...
Yann Chevaleyre, Ulle Endriss, Jérôme...
92
Voted
IJCAI
2007
15 years 1 months ago
A Game-Theoretic Analysis of Strictly Competitive Multiagent Scenarios
This paper is a comparative study of game-theoretic solution concepts in strictly competitive multiagent scenarios, as commonly encountered in the context of parlor games, competi...
Felix Brandt, Felix A. Fischer, Paul Harrenstein, ...