Sciweavers

35419 search results - page 243 / 7084
» How are we doing
Sort
View
JUCS
2010
160views more  JUCS 2010»
14 years 11 months ago
How Incomputable is Finding Nash Equilibria?
Abstract: We investigate the Weihrauch-degree of several solution concepts from noncooperative game theory. While the consideration of Nash equilibria forms the core of our work, a...
Arno Pauly
INTERACT
2003
15 years 6 months ago
Programming in the Kitchen
: In this paper we discuss issues for the integration of computing power in mundane artefacts. We do so with reference to a recent project with a manufacturer of ovens for larger k...
Olav W. Bertelsen, Toke Eskildsen, Werner Sperschn...
135
Voted
CORR
2006
Springer
114views Education» more  CORR 2006»
15 years 4 months ago
Emergence Explained
Abstract. Emergence--macro-level effects from micro-level causes--is at the heart of the conflict between reductionism and functionalism. How can there be autonomous higher level l...
Russ Abbott
FOCS
2007
IEEE
15 years 11 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
CCS
2007
ACM
15 years 11 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...