Sciweavers

1218 search results - page 23 / 244
» The many facets of natural computing
Sort
View
78
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
CN
2010
109views more  CN 2010»
14 years 9 months ago
A taxonomy of biologically inspired research in computer networking
The natural world is enormous, dynamic, incredibly diverse, and highly complex. Despite the inherent challenges of surviving in such a world, biological organisms evolve, self-org...
Michael Meisel, Vasileios Pappas, Lixia Zhang
TKDE
2010
151views more  TKDE 2010»
14 years 7 months ago
Duplicate-Insensitive Order Statistics Computation over Data Streams
—Duplicates in data streams may often be observed by the projection on a subspace and/or multiple recordings of objects. Without the uniqueness assumption on observed data elemen...
Ying Zhang, Xuemin Lin, Yidong Yuan, Masaru Kitsur...
MODELS
2007
Springer
15 years 3 months ago
Model-Based Design of Computer-Controlled Game Character Behavior
Recently, the complexity of modern, real-time computer games has increased drastically. The need for sophisticated game AI, in particular for Non-Player Characters, grows with the ...
Jörg Kienzle, Alexandre Denault, Hans Vanghel...
ASIAN
2006
Springer
134views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Computational Soundness of Formal Indistinguishability and Static Equivalence
In the investigation of the relationship between the formal and the computational view of cryptography, a recent approach, first proposed in [10], uses static equivalence from cryp...
Gergei Bana, Payman Mohassel, Till Stegers