Sciweavers

3395 search results - page 645 / 679
» Computational Differential Privacy
Sort
View
CN
2006
91views more  CN 2006»
13 years 10 months ago
Reputation-based policies that provide the right incentives in peer-to-peer environments
Peer-to-peer are popular environments for exchanging services. A reputation mechanism is a proper means of discovering low-performing peers that fail to provide their services. In...
Thanasis G. Papaioannou, George D. Stamoulis
CPHYSICS
2006
182views more  CPHYSICS 2006»
13 years 10 months ago
MinFinder: Locating all the local minima of a function
A new stochastic clustering algorithm is introduced that aims to locate all the local minima of a multidimensional continuous and differentiable function inside a bounded domain. ...
Ioannis G. Tsoulos, Isaac E. Lagaris
ENTCS
2006
97views more  ENTCS 2006»
13 years 10 months ago
VyrdMC: Driving Runtime Refinement Checking with Model Checkers
This paper presents VyrdMC, a runtime verification tool we are building for concurrent software components. The correctness criterion checked by VyrdMC is refinement: Each executi...
Tayfun Elmas, Serdar Tasiran
JCST
2008
140views more  JCST 2008»
13 years 10 months ago
ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks
The allocation of bandwidth to unlicensed users, without significantly increasing the interference on the existing licensed users, is a challenge for Ultra Wideband (UWB) networks....
Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal
JCB
2006
107views more  JCB 2006»
13 years 10 months ago
Protein Image Alignment via Piecewise Affine Transformations
Abstract We present a new approach for aligning families of 2D gels. Instead of choosing one of the gels as reference and performing pairwise alignment, we construct an ideal gel t...
Florian A. Potra, Xing Liu, Françoise Seill...