Sciweavers

14936 search results - page 5 / 2988
» Can They Take It With Them
Sort
View
ESOA
2006
13 years 11 months ago
Greedy Cheating Liars and the Fools Who Believe Them
Evolutionary algorithms based on "tags" can be adapted to induce cooperation in selfish environments such as peer-to-peer systems. In this approach, nodes periodically co...
Stefano Arteconi, David Hales, Özalp Babaoglu
MOBISYS
2005
ACM
14 years 7 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
FAST
2004
13 years 8 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
WWW
2006
ACM
14 years 8 months ago
One document to bind them: combining XML, web services, and the semantic web
We present a paradigm for uniting the diverse strands of XML-based Web technologies by allowing them to be incorporated within a single document. This overcomes the distinction be...
Harry Halpin, Henry S. Thompson
ICRA
2007
IEEE
107views Robotics» more  ICRA 2007»
14 years 1 months ago
Job-agents: How to coordinate them?
– With our proposed decomposition into layers, a generic framework leading to the reuse of previously produced software and the extraction of useful portions can be achieved. The...
Niak Wu Koh, Cezary Zielinski, Marcelo H. Ang, Ser...