Sciweavers

889 search results - page 125 / 178
» A computational model of achievement motivation for artifici...
Sort
View
EUROCRYPT
2004
Springer
14 years 1 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
AAAI
2007
13 years 10 months ago
Simple Robots with Minimal Sensing: From Local Visibility to Global Geometry
We consider problems of geometric exploration and selfdeployment for simple robots that can only sense the combinatorial (non-metric) features of their surroundings. Even with suc...
Subhash Suri, Elias Vicari, Peter Widmayer
ALIFE
2008
13 years 8 months ago
The Embodiment of Cockroach Aggregation Behavior in a Group of Micro-robots
We report the faithful reproduction of the self-organized aggregation behavior of the German cockroach Blattella germanica with a group of robots. We describe the implementation of...
Simon Garnier, Christian Jost, Jacques Gautrais, M...
PERCOM
2011
ACM
12 years 11 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
SIGECOM
2005
ACM
169views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Online auctions with re-usable goods
This paper concerns the design of mechanisms for online scheduling in which agents bid for access to a re-usable resource such as processor time or wireless network access. Each a...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Mo...