Sciweavers

628 search results - page 56 / 126
» Designing the perfect auction
Sort
View
SIGECOM
2010
ACM
219views ECommerce» more  SIGECOM 2010»
14 years 2 months ago
Revenue maximization with a single sample
We design and analyze approximately revenue-maximizing auctions in general single-parameter settings. Bidders have publicly observable attributes, and we assume that the valuation...
Peerapong Dhangwatnotai, Tim Roughgarden, Qiqi Yan
ICPR
2006
IEEE
14 years 11 months ago
Detecting irregularities in regular patterns
This study compares three different methods designed for detecting irregularities from regular dot patterns. Frequency domain information is used to split an original regular patt...
Jarkko Vartiainen, Albert Sadovnikov, Lasse Lensu,...
STACS
2010
Springer
14 years 4 months ago
The Recognition of Tolerance and Bounded Tolerance Graphs
Tolerance graphs model interval relations in such a way that intervals can tolerate a certain degree of overlap without being in conflict. This subclass of perfect graphs has bee...
George B. Mertzios, Ignasi Sau, Shmuel Zaks
JPDC
2008
103views more  JPDC 2008»
13 years 10 months ago
On termination detection in crash-prone distributed systems with failure detectors
We investigate the problem of detecting termination of a distributed computation in systems where processes can fail by crashing. Specifically, when the communication topology is ...
Neeraj Mittal, Felix C. Freiling, Subbarayan Venka...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
14 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon