Sciweavers

16513 search results - page 3230 / 3303
» Numerical Analysis Methods
Sort
View
ATAL
2006
Springer
15 years 6 months ago
Failures of the VCG mechanism in combinatorial auctions and exchanges
The VCG mechanism is the canonical method for motivating bidders in combinatorial auctions and exchanges to bid truthfully. We study two related problems concerning the VCG mechan...
Vincent Conitzer, Tuomas Sandholm
129
Voted
AXMEDIS
2006
IEEE
241views Multimedia» more  AXMEDIS 2006»
15 years 6 months ago
SMIL to MPEG-4 BIFS Conversion
Traditional media, such as text, image, audio and video, have long been the main media resources and granted full support of standard desktop tools and applications. Interactive r...
Beilu Shao, Laureano Moro Velazquez, Nicolas Scari...
163
Voted
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
15 years 6 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
131
Voted
CC
2006
Springer
124views System Software» more  CC 2006»
15 years 6 months ago
Polyhedral Code Generation in the Real World
The polyhedral model is known to be a powerful framework to reason about high level loop transformations. Recent developments in optimizing compilers broke some generally accepted ...
Nicolas Vasilache, Cédric Bastoul, Albert C...
CCS
2006
ACM
15 years 6 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
« Prev « First page 3230 / 3303 Last » Next »