Sciweavers

1064 search results - page 184 / 213
» Cryptography from Anonymity
Sort
View
EPS
1997
Springer
14 years 1 months ago
Modeling Speculators with Genetic Programming
In spirit of the earlier works done by Arthur (1992) and Palmer et al. (1993), this paper models speculators with genetic programming (GP) in a production economy (Muthian Economy)...
Shu-Heng Chen, Chia-Hsuan Yeh
HICSS
1994
IEEE
141views Biometrics» more  HICSS 1994»
14 years 1 months ago
Empirical CATeam Research in Meetings
Meeting research and especially research on Computer Supported Meetings of natural teams is not available in abundance. What is reported of meetings often uses a rather limited th...
Helmut Krcmar, Henrik Lewe, Gerhard Schwabe
PODC
2010
ACM
13 years 11 months ago
On the computational power of oblivious robots: forming a series of geometric patterns
We study the computational power of a distributed system consisting of simple autonomous robots moving on the plane. The robots are endowed with visual perception but do not have ...
Shantanu Das, Paola Flocchini, Nicola Santoro, Mas...
MANSCI
2006
119views more  MANSCI 2006»
13 years 9 months ago
Supply Chain Choice on the Internet
Internet companies extensively use the practice of drop-shipping, where the wholesaler stocks and owns the inventory and ships products directly to customers at retailers' re...
Serguei Netessine, Nils Rudi
MANSCI
2007
88views more  MANSCI 2007»
13 years 9 months ago
The Timing of Resource Development and Sustainable Competitive Advantage
We develop a formal model of the timing of resource development by competing …rms. Our aim is to deepen and extend resource-level theorizing about sustainable competitive advant...
Gonçalo Pacheco-de-Almeida, Peter Zemsky