Sciweavers

2927 search results - page 504 / 586
» Secure Distributed Human Computation
Sort
View
117
Voted
TARK
2005
Springer
15 years 8 months ago
Unconditional privacy in social choice
The aggregation of conflicting preferences is an important issue in human society and multiagent systems. Due to its universality, voting among a set of alternatives has a centra...
Felix Brandt, Tuomas Sandholm
RT
2001
Springer
15 years 6 months ago
An Illumination Model for a Skin Layer Bounded by Rough Surfaces
In this paper we present a novel illumination model that takes into account multiple anisotropic scattering in a layer bounded by two rough surfaces. We compute the model by a dis...
Jos Stam
MOBIHOC
2000
ACM
15 years 6 months ago
DEAPspace: transient ad-hoc networking of pervasive devices
The rapid spreading of mobile computerized devices marks the beginning of a new computing paradigm characterized by ad hoc networking and spontaneous interaction, taking place tra...
Reto Hermann, Dirk Husemann, Michael Moser, Michae...
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 6 months ago
An artificial immune system and its integration into an organic middleware for self-protection
Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our re...
Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer
JIB
2007
95views more  JIB 2007»
15 years 2 months ago
Integration of constraints documented in SBML, SBO, and the SBML Manual facilitates validation of biological models
The creation of quantitative, simulatable, Systems Biology Markup Language (SBML) models that accurately simulate the system under study is a time-intensive manual process that re...
Allyson L. Lister, Matthew R. Pocock, Anil Wipat