Sciweavers

107 search results - page 19 / 22
» Design of Incentive Compatible Mechanisms for Stackelberg Pr...
Sort
View
JSAC
2011
136views more  JSAC 2011»
12 years 10 months ago
Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach
—Cognitive radio is a promising paradigm to achieve efficient utilization of spectrum resource by allowing the unlicensed users (i.e., secondary users, SUs) to access the licens...
Lin Gao, Xinbing Wang, Youyun Xu, Qian Zhang
DATE
2003
IEEE
96views Hardware» more  DATE 2003»
14 years 25 days ago
Time Domain Multiplexed TAM: Implementation and Comparison
One of the difficult problems which core-based systemon-chip (SoC) designs face is test access. For testing the cores in a SoC, a special mechanism is required, since they are no...
Zahra Sadat Ebadi, André Ivanov
SELMAS
2004
Springer
14 years 27 days ago
A Software Framework for Automated Negotiation
If agents are to negotiate automatically with one another they must share a negotiation mechanism, specifying what possible actions each party can take at any given time, when nego...
Claudio Bartolini, Chris Preist, Nicholas R. Jenni...
ACSAC
2005
IEEE
14 years 1 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
SOUPS
2010
ACM
13 years 11 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...