Sciweavers

25156 search results - page 4988 / 5032
» Applications for conscious systems
Sort
View
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 7 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
SIAMSC
2008
97views more  SIAMSC 2008»
13 years 7 months ago
Long-Time Simulations on High Resolution Meshes to Model Calcium Waves in a Heart Cell
Abstract. A model for the flow of calcium in an atrial heart cell is given by a system of timedependent reaction-diffusion equations coupled by non-linear reaction terms. Calcium i...
Matthias K. Gobbert
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SIGECOM
2008
ACM
138views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Generalized scoring rules and the frequency of coalitional manipulability
We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based onl...
Lirong Xia, Vincent Conitzer
SIGIR
2008
ACM
13 years 7 months ago
A user browsing model to predict search engine click data from past observations
Search engine click logs provide an invaluable source of relevance information but this information is biased because we ignore which documents from the result list the users have...
Georges Dupret, Benjamin Piwowarski
« Prev « First page 4988 / 5032 Last » Next »