Sciweavers

1588 search results - page 304 / 318
» The Intelligence Within
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
ECAL
2005
Springer
14 years 3 months ago
A Co-evolutionary Epidemiological Model for Artificial Life and Death
Abstract. This paper presents a model of the co-evolution of transmissible disease and a population of non-randomly mixed susceptible agents. The presence of the disease elements i...
Alan Dorin
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
14 years 3 months ago
Mission planning for joint suppression of enemy air defenses using a genetic algorithm
In this paper we present a genetic algorithm applied to the problem of mission planning for Joint Suppression of Enemy Air Defenses (JSEAD) in support of air strike operations. Th...
Jeffrey P. Ridder, Jason C. HandUber
WINE
2005
Springer
161views Economy» more  WINE 2005»
14 years 3 months ago
Design of Incentive Compatible Mechanisms for Stackelberg Problems
This paper takes the first steps towards designing incentive compatible mechanisms for hierarchical decision making problems involving selfish agents. We call these Stackelberg p...
Dinesh Garg, Yadati Narahari
SIGCOMM
2004
ACM
14 years 3 months ago
A comparison of overlay routing and multihoming route control
The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to e...
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srini...