Sciweavers

2061 search results - page 239 / 413
» Authorization for Metacomputing Applications
Sort
View
129
Voted
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 8 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
ATAL
2008
Springer
15 years 6 months ago
Distributed multiagent resource allocation in diminishing marginal return domains
We consider a multiagent resource allocation domain where the marginal production of each resource is diminishing. A set of identical, self-interested agents requires access to sh...
Yoram Bachrach, Jeffrey S. Rosenschein
129
Voted
CSCW
2008
ACM
15 years 6 months ago
Range: exploring implicit interaction through electronic whiteboard design
An important challenge in designing ubiquitous computing experiences is negotiating transitions between explicit and implicit interaction, such as how and when to provide users wi...
Wendy Ju, Brian A. Lee, Scott R. Klemmer
AAAI
2006
15 years 6 months ago
Computing Slater Rankings Using Similarities among Candidates
Voting (or rank aggregation) is a general method for aggregating the preferences of multiple agents. One important voting rule is the Slater rule. It selects a ranking of the alte...
Vincent Conitzer
ECIS
2000
15 years 5 months ago
A Systematic Analysis of the Effect of Task Clarity on Software Development Design
Two different types of development tasks are distinguished: Clear and unclear development tasks. Based on hypotheses from organizational theory two different designs of software d...
Werner Mellis