Sciweavers

14515 search results - page 2850 / 2903
» Efficient Embedded Computing
Sort
View
ATAL
2008
Springer
13 years 12 months ago
Mobile opportunistic commerce: mechanisms, architecture, and application
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
Ece Kamar, Eric Horvitz, Chris Meek
ATAL
2008
Springer
13 years 12 months ago
Undominated VCG redistribution mechanisms
Many important problems in multiagent systems can be seen as resource allocation problems. For such problems, the well-known Vickrey-Clarke-Groves (VCG) mechanism is efficient, in...
Mingyu Guo, Vincent Conitzer
ATAL
2008
Springer
13 years 12 months ago
Regulating air traffic flow with coupled agents
The ability to provide flexible, automated management of air traffic is critical to meeting the ever increasing needs of the next generation air transportation systems. This probl...
Adrian K. Agogino, Kagan Tumer
CCS
2008
ACM
13 years 12 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CCS
2008
ACM
13 years 12 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
« Prev « First page 2850 / 2903 Last » Next »