Sciweavers

14235 search results - page 2753 / 2847
» Is computer science science
Sort
View
SACMAT
2009
ACM
15 years 10 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
SIGECOM
2009
ACM
100views ECommerce» more  SIGECOM 2009»
15 years 10 months ago
The price of uncertainty
We study the degree to which small fluctuations in costs in wellstudied potential games can impact the result of natural best-response and improved-response dynamics. We call thi...
Maria-Florina Balcan, Avrim Blum, Yishay Mansour
CDC
2008
IEEE
15 years 10 months ago
Enabling bio-feedback using real-time fMRI
— Despite the enormous complexity of the human mind, fMRI techniques are able to partially observe the state of a brain in action. In this paper we describe an experimental setup...
Henrik Ohlsson, Joakim Rydell, Anders Brun, Jacob ...
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 10 months ago
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Pruet Boonma, Junichi Suzuki
143
Voted
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
15 years 10 months ago
Leveraging the Wisdom of Crowds: Designing an IT-Supported Ideas Competition for an ERP Software Company
“Crowdsourcing” is currently one of the most discussed key words within the open innovation community. The major question for both research and business is how to find and lev...
Winfried Ebner, Jan Marco Leimeister, Ulrich Brets...
« Prev « First page 2753 / 2847 Last » Next »