Sciweavers

988 search results - page 167 / 198
» An experimental analysis of Zigbee networks
Sort
View
SIGECOM
2006
ACM
138views ECommerce» more  SIGECOM 2006»
14 years 4 months ago
Bid expressiveness and clearing algorithms in multiattribute double auctions
We investigate the space of two-sided multiattribute auctions, focusing on the relationship between constraints on the offers traders can express through bids, and the resulting c...
Yagil Engel, Michael P. Wellman, Kevin M. Lochner
WINE
2005
Springer
109views Economy» more  WINE 2005»
14 years 4 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
AVBPA
2003
Springer
190views Biometrics» more  AVBPA 2003»
14 years 4 months ago
Combining Face and Iris Biometrics for Identity Verification
Face and iris identification have been employed in various biometric applications. Besides improving the verification performance, the fusion of both of the biometrics has several ...
Yunhong Wang, Tieniu Tan, Anil K. Jain
DATE
2010
IEEE
166views Hardware» more  DATE 2010»
14 years 3 months ago
From transistors to MEMS: Throughput-aware power gating in CMOS circuits
—In this paper we study the effectiveness of two power gating methods – transistor switches and MEMS switches – in reducing the power consumption of a design with a certain t...
Michael B. Henry, Leyla Nazhandali
ACSAC
2002
IEEE
14 years 3 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok