Sciweavers

1996 search results - page 63 / 400
» Financial Theory 2
Sort
View
ICYCS
2008
IEEE
14 years 4 months ago
DSmT Qualitative Reasoning based on 2-Tuple Linguistic Representation Model
Most of modern systems for information retrieval, fusion and management have to deal more and more with information expressed quatitatively (by linguistic labels) since human repo...
Xinde Li, Xianzhong Dai, Jean Dezert, Florentin Sm...
OTM
2007
Springer
14 years 4 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
SIGMETRICS
2010
ACM
146views Hardware» more  SIGMETRICS 2010»
13 years 4 months ago
In-degree dynamics of large-scale P2P systems
This paper builds a complete modeling framework for understanding user churn and in-degree dynamics in unstructured P2P systems in which each user can be viewed as a stationary al...
Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov
ICPP
2007
IEEE
14 years 4 months ago
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
Souvik Ray, Giora Slutzki, Zhao Zhang
STACS
2007
Springer
14 years 4 months ago
The Polynomially Bounded Perfect Matching Problem Is in NC 2
Abstract. The perfect matching problem is known to be in ¶, in randomized NC, and it is hard for NL. Whether the perfect matching problem is in NC is one of the most prominent ope...
Manindra Agrawal, Thanh Minh Hoang, Thomas Thierau...