Sciweavers

4880 search results - page 857 / 976
» Mechanism Design by Creditability
Sort
View
SIGECOM
2003
ACM
122views ECommerce» more  SIGECOM 2003»
14 years 2 months ago
k-Implementation
This paper discusses an interested party who wishes to influence the behavior of agents in a game (multi-agent interaction), which is not under his control. The interested party ...
Dov Monderer, Moshe Tennenholtz
SIGMETRICS
2003
ACM
197views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
Modeling the throughput of TCP Vegas
Previous analytic models of TCP Vegas throughput have been developed for loss-free (all-Vegas) networks. This work develops a simple and accurate analytic model for the throughput...
Charalampos (Babis) Samios, Mary K. Vernon
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
14 years 2 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
ICRA
2002
IEEE
100views Robotics» more  ICRA 2002»
14 years 2 months ago
Achieving Sharp Deliveries in Supply Chains through Variance Pool Allocation
Variability reduction and business process synchronization are acknowledged as key to achieving sharp and timely deliveries in supply chain networks. In this paper, we develop an ...
Dinesh Garg, Yadati Narahari, Nukala Viswanadham
BIRTHDAY
2010
Springer
14 years 2 months ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem