Sciweavers

1368 search results - page 87 / 274
» A Hybrid Reputation Model Based on the Use of Organizations
Sort
View
VLSID
2006
IEEE
86views VLSI» more  VLSID 2006»
14 years 10 months ago
Partial Product Reduction Based on Look-Up Tables
In this paper a new technique for partial product reduction based on the use of look-up tables for efficient processing is presented. We describe how to construct counter devices ...
F. Pujol López, Higinio Mora Mora, Jer&oacu...
GPEM
2007
116views more  GPEM 2007»
13 years 10 months ago
Using evolvable genetic cellular automata to model breast cancer
Cancer is an evolutionary process; mutated cells are selected for abnormal growth and survivability. Here, a computer simulation is used to model ductal carcinoma in situ (DCIS), ...
Armand Bankhead, Robert B. Heckendorn
ATVA
2009
Springer
172views Hardware» more  ATVA 2009»
14 years 4 months ago
Symbolic CTL Model Checking of Asynchronous Systems Using Constrained Saturation
Abstract. The saturation state-space generation algorithm has demonstrated clear improvements over state-of-the-art symbolic methods for asynchronous systems. This work is motivate...
Yang Zhao, Gianfranco Ciardo
INFOCOM
2009
IEEE
14 years 4 months ago
A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks
Abstract— Although direct reciprocity (Tit-for-Tat) contribution systems have been successful in reducing freeloading in peerto-peer overlays, it has been shown that, unless the ...
Raul Landa, David Griffin, Richard G. Clegg, Eleni...
JOIN
2006
113views more  JOIN 2006»
13 years 10 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...