Sciweavers

2413 search results - page 353 / 483
» Understanding the problem
Sort
View
95
Voted
CORR
2010
Springer
72views Education» more  CORR 2010»
15 years 3 months ago
Sequential Rationality in Cryptographic Protocols
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationallybounded pl...
Ronen Gradwohl, Noam Livne, Alon Rosen
114
Voted
CORR
2010
Springer
94views Education» more  CORR 2010»
15 years 3 months ago
Is Witsenhausen's counterexample a relevant toy?
This paper answers a question raised by Doyle on the relevance of the Witsenhausen counterexample as a toy decentralized control problem. The question has two sides, the first of w...
Pulkit Grover, Anant Sahai
89
Voted
CORR
2008
Springer
66views Education» more  CORR 2008»
15 years 3 months ago
A Novel Approach to Formulae Production and Overconfidence Measurement to Reduce Risk in Spreadsheet Modelling
Research on formulae production in spreadsheets has established the practice as high risk yet unrecognised as such by industry. There are numerous software applications that are d...
Simon R. Thorne, David Ball, Zoe Lawson
126
Voted
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 3 months ago
Integration of Agile Ontology Mapping towards NLP Search in I-SOAS
In this research paper we address the importance of Product Data Management (PDM) with respect to its contributions in industry. Moreover we also present some currently available ...
Zeeshan Ahmed, Ina Tacheva
122
Voted
EOR
2008
109views more  EOR 2008»
15 years 3 months ago
Basin-wide cooperative water resources allocation
The Cooperative Water Allocation Model (CWAM) is designed within a general mathematical programming framework for modeling equitable and efficient water allocation among competing...
Lizhong Wang, Liping Fang, Keith W. Hipel