Sciweavers

1189 search results - page 189 / 238
» Information Concealing Games
Sort
View
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 4 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
ATAL
2009
Springer
14 years 4 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
SUM
2009
Springer
14 years 4 months ago
An Argument-Based Approach to Using Multiple Ontologies
Abstract. Logic-based argumentation offers an approach to querying and revising multiple ontologies that are inconsistent or incoherent. A common assumption for logic-based argumen...
Elizabeth Black, Anthony Hunter, Jeff Z. Pan
VR
2008
IEEE
173views Virtual Reality» more  VR 2008»
14 years 4 months ago
Rapid Creation of Large-scale Photorealistic Virtual Environments
The rapid and efficient creation of virtual environments has become a crucial part of virtual reality applications. In particular, civil and defense applications often require an...
Charalambos Poullis, Suya You, Ulrich Neumann