Sciweavers

1316 search results - page 232 / 264
» Open Issues in Industrial Use Case Modeling
Sort
View
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
14 years 7 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
EPIA
2009
Springer
13 years 11 months ago
Obstacle Detection, Identification and Sharing on a Robotic Soccer Team
When building a representation of the environment for a robot in a multi-agent application, as is the case of robotic soccer, sensor and information fusion of several elements of t...
João Silva, Nuno Lau, António J. R. ...
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
WWW
2006
ACM
14 years 8 months ago
Reappraising cognitive styles in adaptive web applications
The mechanisms for personalisation used in web applications are currently the subject of much debate amongst researchers from many diverse subject areas. One of the most contempor...
Adam Moore, Elizabeth J. Brown, Helen Ashman, Tim ...
DAC
2010
ACM
13 years 11 months ago
TSV stress aware timing analysis with applications to 3D-IC layout optimization
As the geometry shrinking faces severe limitations, 3D wafer stacking with through silicon via (TSV) has gained interest for future SOC integration. Since TSV fill material and s...
Jae-Seok Yang, Krit Athikulwongse, Young-Joon Lee,...