Sciweavers

1541 search results - page 297 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
94
Voted
WSC
2004
15 years 1 months ago
Data Farming Coevolutionary Dynamics in RePast
This paper describes the application of data farming techniques (Brandstein and Horne 1998) to explore various aspects of coevolutionary dynamics (McKelvey 2002) in organization s...
Brian F. Tivnan
101
Voted
WINE
2005
Springer
100views Economy» more  WINE 2005»
15 years 5 months ago
A Primal-Dual Algorithm for Computing Fisher Equilibrium in the Absence of Gross Substitutability Property
Abstract. We provide the first strongly polynomial time exact combinatorial algorithm to compute Fisher equilibrium for the case when utility functions do not satisfy the Gross su...
Dinesh Garg, Kamal Jain, Kunal Talwar, Vijay V. Va...
IJFCS
2006
130views more  IJFCS 2006»
15 years 11 days ago
Mealy multiset automata
We introduce the networks of Mealy multiset automata, and study their computational power. The networks of Mealy multiset automata are computationally complete. 1 Learning from Mo...
Gabriel Ciobanu, Viorel Mihai Gontineac
110
Voted
EUROCRYPT
2008
Springer
15 years 2 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
CCR
2008
118views more  CCR 2008»
15 years 15 days ago
A generic language for application-specific flow sampling
Flow records gathered by routers provide valuable coarse-granularity traffic information for several measurement-related network applications. However, due to high volumes of traf...
Harsha V. Madhyastha, Balachander Krishnamurthy