Sciweavers

2379 search results - page 300 / 476
» Computer Science in the Information Age
Sort
View
ECCC
2008
108views more  ECCC 2008»
15 years 4 months ago
The Complexity of Rationalizing Matchings
Given a set of observed economic choices, can one infer preferences and/or utility functions for the players that are consistent with the data? Questions of this type are called r...
Shankar Kalyanaraman, Christopher Umans
SENSYS
2010
ACM
15 years 2 months ago
Adaptive decentralized control of underwater sensor networks for modeling underwater phenomena
Understanding the dynamics of bodies of water and their impact on the global environment requires sensing information over the full volume of water. We develop a gradientbased dec...
Carrick Detweiler, Marek Doniec, Mingshun Jiang, M...
CIKM
2005
Springer
15 years 10 months ago
Maximal termsets as a query structuring mechanism
Search engines process queries conjunctively to restrict the size of the answer set. Further, it is not rare to observe a mismatch between the vocabulary used in the text of Web p...
Bruno Pôssas, Nivio Ziviani, Berthier A. Rib...
MOBISYS
2006
ACM
16 years 4 months ago
FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments
In this paper we present FireWxNet, a multi-tiered portable wireless system for monitoring weather conditions in rugged wildland fire environments. FireWxNet provides the fire fig...
Carl Hartung, Richard Han, Carl Seielstad, Saxon H...
CCS
2007
ACM
15 years 10 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...