Sciweavers

13618 search results - page 2575 / 2724
» The Newton Operating System
Sort
View
127
Voted
ATAL
2010
Springer
15 years 4 months ago
Heuristic search for identical payoff Bayesian games
Bayesian games can be used to model single-shot decision problems in which agents only possess incomplete information about other agents, and hence are important for multiagent co...
Frans A. Oliehoek, Matthijs T. J. Spaan, Jilles St...
127
Voted
CCIA
2009
Springer
15 years 4 months ago
mWater: a Sandbox for Agreement Technologies
The management of natural resources is an intricate and consequential task. In particular, water management is at the forefront of public policy priorities in many countries becaus...
Antonio Garrido, Adriana Giret, Pablo Noriega
138
Voted
CLEF
2010
Springer
15 years 4 months ago
Automatic Prior Art Searching and Patent Encoding at CLEF-IP '10
In the intellectual property field two tasks are of high relevance: prior art searching and patent classification. Prior art search is fundamental for many strategic issues such as...
Douglas Teodoro, Julien Gobeill, Emilie Pasche, Di...
140
Voted
CONEXT
2009
ACM
15 years 4 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
153
Voted
CONEXT
2009
ACM
15 years 4 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
« Prev « First page 2575 / 2724 Last » Next »