Sciweavers

2266 search results - page 27 / 454
» Some Solutions to the Ignoring Problem
Sort
View
CCIA
2009
Springer
15 years 2 months ago
A Cryptographic Solution for Private Distributed Simple Meeting Scheduling
Meeting Scheduling is a suitable application for distributed computation, motivated by its privacy requirements. Previous work on this problem have considered some cryptographic te...
Javier Herranz, Stan Matwin, Pedro Meseguer, Jordi...
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
15 years 7 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
SIGGRAPH
1996
ACM
15 years 5 months ago
Adding Force Feedback to Graphics Systems: Issues and Solutions
Integrating force feedback with a complete real-time virtual environment system presents problems which are more difficult than those encountered in building simpler forcefeedback...
William R. Mark, Scott C. Randolph, Mark Finch, Ja...
AI
2005
Springer
15 years 1 months ago
Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving
Because of privacy concerns, agents may not want to reveal information that could be of use in problem solving. As a result, there are potentially important tradeoffs between main...
Richard J. Wallace, Eugene C. Freuder
ENDM
2008
93views more  ENDM 2008»
15 years 1 months ago
The Generalized Max-Controlled Set Problem
In this work we deal with sandwich graphs G = (V, E) and present the notion of vertices f-controlled by a subset M V . We introduce the generalized maxcontrolled set problem (gmc...
Ivairton M. Santos, Carlos A. J. Martinhon, Luiz S...