Sciweavers

57 search results - page 7 / 12
» jcp 2007
Sort
View
JCP
2007
73views more  JCP 2007»
14 years 10 months ago
Investigating Shill Bidding Behaviour Involving Colluding Bidders
Abstract— Shill bidding is where spurious bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Trevathan and Re...
Jarrod Trevathan, Wayne Read
JCP
2007
118views more  JCP 2007»
14 years 10 months ago
Tutoring an Entire Game with Dynamic Strategy Graphs: The Mixed-Initiative Sudoku Tutor
Abstract— In this paper, we develop a mixed-initiative intelligent tutor for the game of Sudoku called MITS. We begin by developing a characterization of the strategies used in S...
Allan Caine, Robin Cohen
JCP
2007
181views more  JCP 2007»
14 years 10 months ago
Reducing Energy Consumption of Wireless Sensor Networks through Processor Optimizations
When the environmental conditions are stable, a typical Wireless Sensor Network (WSN) application may sense and process very similar or constant data values for long durations. Thi...
Gürhan Küçük, Can Basaran
JCP
2007
96views more  JCP 2007»
14 years 10 months ago
A Language to Enable Distributed Simulation of Extended Queueing Networks
— Distributed simulators are increasingly being used for their intrinsic advantages in terms of reusability, fault tolerance, performance, and geographic distribution. The develo...
Daniele Gianni, Andrea D'Ambrogio
JCP
2007
127views more  JCP 2007»
14 years 10 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong