Sciweavers

577 search results - page 94 / 116
» Computing Rational Bisectors
Sort
View
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ICALT
2006
IEEE
14 years 1 months ago
Hybrid System for Generating Learning Object Metadata
– Generating LOM for learning material is a complex and tedious task to be manually completed. Therefore, the current trend is to automate this process. However, there are severa...
Olivier Motelet, Nelson A. Baloian
IWNAS
2006
IEEE
14 years 1 months ago
Towards a More Accurate Availability Evaluation
Data availability evaluation is the crucial problem to build large-scale, high available peer-to-peer storage systems by governing many unreliable hosts. However, many recent stud...
Zhi Yang, Jing Tian, Yafei Dai
ACMICEC
2006
ACM
157views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Adaptive mechanism design: a metalearning approach
Auction mechanism design has traditionally been a largely analytic process, relying on assumptions such as fully rational bidders. In practice, however, bidders often exhibit unkn...
David Pardoe, Peter Stone, Maytal Saar-Tsechansky,...
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...