Sciweavers

177 search results - page 31 / 36
» Splitting a Default Theory
Sort
View
FCSC
2010
92views more  FCSC 2010»
13 years 5 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
WINE
2010
Springer
152views Economy» more  WINE 2010»
13 years 5 months ago
Collusion in VCG Path Procurement Auctions
We consider collusion in path procurement auctions, where payments are determined using the VCG mechanism. We show that collusion can increase the utility of the agents, and in som...
Yoram Bachrach, Peter Key, Morteza Zadimoghaddam
SIGCOMM
2012
ACM
11 years 9 months ago
Route shepherd: stability hints for the control plane
The Route Shepherd tool demonstrates applications of choosing between routing protocol configurations on the basis of rigorouslysupported theory. Splitting the configuration spa...
Alexander J. T. Gurney, Xianglong Han, Yang Li, Bo...
PERCOM
2009
ACM
14 years 2 months ago
TreeMAC: Localized TDMA MAC Protocol for Real-time High-data-rate Sensor Networks
—Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This m...
Wen-Zhan Song, Renjie Huang, Behrooz Shirazi, Rich...
DAMAS
2005
Springer
14 years 26 days ago
Cognitive Agents for Sense and Respond Logistics
We present a novel cognitive agent architecture and demonstrate its effectiveness in the Sense and Respond Logistics (SRL) domain. Effective applications to support SRL must antic...
Kshanti A. Greene, David G. Cooper, Anna L. Buczak...