Sciweavers

2357 search results - page 417 / 472
» Computing Refactorings of Behavior Models
Sort
View
MOBICOM
2004
ACM
14 years 1 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
14 years 1 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
SIGECOM
2004
ACM
93views ECommerce» more  SIGECOM 2004»
14 years 1 months ago
Strategic deliberation and truthful revelation: an impossibility result
In many market settings, agents do not know their preferences a priori. Instead, they may have to solve computationally complex optimization problems, query databases, or perform ...
Kate Larson, Tuomas Sandholm
GECCO
2004
Springer
113views Optimization» more  GECCO 2004»
14 years 1 months ago
Implications of Epigenetic Learning Via Modification of Histones on Performance of Genetic Programming
Extending the notion of inheritable genotype in genetic programming (GP) from the common model of DNA into chromatin (DNA and histones), we propose an approach of embedding in GP a...
Ivan Tanev, Kikuo Yuta
HYBRID
2004
Springer
14 years 1 months ago
Understanding the Bacterial Stringent Response Using Reachability Analysis of Hybrid Systems
Abstract. In this paper we model coupled genetic and metabolic networks as hybrid systems. The vector fields are multi - affine, i.e., have only product - type nonlinearities to a...
Calin Belta, Peter Finin, Luc C. G. J. M. Habets, ...