Sciweavers

1022 search results - page 125 / 205
» Stable models and circumscription
Sort
View
ICDCSW
2006
IEEE
14 years 4 months ago
Enforcing Truthful-Rating Equilibria in Electronic Marketplaces
Reputation-based mechanisms and policies are vulnerable to the submission of untruthful ratings. In this paper, we define and analyze a game-theoretic model that captures the dyn...
Thanasis G. Papaioannou, George D. Stamoulis
ICRA
2006
IEEE
130views Robotics» more  ICRA 2006»
14 years 4 months ago
Time Optimal Control for Quadruped Walking Robots
- Time optimal control method for quadruped walking robots are developed and installed into a practical robot system. Each leg is modeled as a two link manipulator whose time optim...
Hisashi Osumi, Shogo Kamiya, Hirokazu Kato, Kazuno...
QEST
2006
IEEE
14 years 4 months ago
Continuous Bytecode Instruction Counting for CPU Consumption Estimation
As an execution platform, the Java Virtual Machine (JVM) provides many benefits in terms of portability and security. However, this advantage turns into an obstacle when it comes...
Andrea Camesi, Jarle Hulaas, Walter Binder
UIST
2006
ACM
14 years 4 months ago
WindowScape: a task oriented window manager
We propose WindowScape, a window manager that uses a photograph metaphor for lightweight, post hoc task management. This is the first task management windowing model to provide in...
Craig S. Tashman
ICNP
2005
IEEE
14 years 3 months ago
Expected Convergence Properties of BGP
Border Gateway Protocol (BGP) is the de facto standard used for interdomain routing. Since packet forwarding may not be possible until stable routes are learned, it is not only cr...
Ramesh Viswanathan, Krishan K. Sabnani, Robert J. ...