Sciweavers

2027 search results - page 353 / 406
» When is it best to best-respond
Sort
View
ADHOCNOW
2004
Springer
15 years 6 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
109
Voted
ATAL
2004
Springer
15 years 6 months ago
A Combinatorial Auction Protocol among Versatile Experts and Amateurs
Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned items is ofte...
Takayuki Ito, Makoto Yokoo, Shigeo Matsubara
DIAGRAMS
2004
Springer
15 years 6 months ago
Geographic Projection of Cluster Composites
A composite cluster map displays a fuzzy categorisation of geographic areas. It combines information from several sources to provide a visualisation of the significance of cluster...
Peter Kleiweg, John Nerbonne, Leonie Bosveld
101
Voted
EMISA
2004
Springer
15 years 6 months ago
eSarine - A Struts-based Webshop for Small and Medium-sized Enterprises
: Electronic commerce becomes an important competitive advantage for small and medium-sized enterprises. Those enterprises therefore need a tool to easily exhibit and sell their pr...
Nicolas Werro, Henrik Stormer, Daniel Frauchiger, ...
97
Voted
MIDDLEWARE
2004
Springer
15 years 6 months ago
iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations
The very nature of implementing and evaluating fully distributed algorithms or protocols in application-layer overlay networks involves certain programming tasks that are at best m...
Baochun Li, Jiang Guo, Mea Wang