Sciweavers

3318 search results - page 343 / 664
» The Weak Instance Model
Sort
View
LATIN
2010
Springer
15 years 6 months ago
Randomized Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines
We study the problem of designing truthful algorithms for scheduling a set of tasks, each one owned by a selfish agent, to a set of parallel (identical or unrelated) machines in or...
Eric Angel, Evripidis Bampis, Nicolas Thibault
160
Voted
ECLIPSE
2005
ACM
15 years 6 months ago
Tool support for feature-oriented software development: featureIDE: an Eclipse-based approach
Software program families have a long tradition and will gain momentum in the future. Today’s research tries to move software development to a new quality of industrial producti...
Thomas Leich, Sven Apel, Laura Marnitz, Gunter Saa...
149
Voted
CCS
2008
ACM
15 years 6 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
NIPS
2004
15 years 6 months ago
Active Learning for Anomaly and Rare-Category Detection
We introduce a novel active-learning scenario in which a user wants to work with a learning algorithm to identify useful anomalies. These are distinguished from the traditional st...
Dan Pelleg, Andrew W. Moore
167
Voted
OPODIS
2000
15 years 6 months ago
Fair and Reliable Self-stabilizing Communication
We assume a link-register communication model under read/write atomicity, where every process can read from but cannot write into its neighbours' registers. The paper present...
Ivan Lavallée, Christian Lavault, Colette J...