Sciweavers

13987 search results - page 2741 / 2798
» The Two Guards Problem
Sort
View
TPDS
2008
118views more  TPDS 2008»
13 years 7 months ago
Interaction of ISPs: Distributed Resource Allocation and Revenue Maximization
The Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher level Internet service providers (ISPs) supply conne...
Sam C. M. Lee, Joe Wenjie Jiang, Dah-Ming Chiu, Jo...
CI
2005
106views more  CI 2005»
13 years 7 months ago
Incremental Learning of Procedural Planning Knowledge in Challenging Environments
Autonomous agents that learn about their environment can be divided into two broad classes. One class of existing learners, reinforcement learners, typically employ weak learning ...
Douglas J. Pearson, John E. Laird
JOC
2007
133views more  JOC 2007»
13 years 7 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
JOC
2007
93views more  JOC 2007»
13 years 7 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
JSAC
2007
59views more  JSAC 2007»
13 years 7 months ago
On scheduling of peer-to-peer video services
Abstract— Peer-to-peer (P2P) video systems provide a costeffective way for a large number of hosts to colloaborate for video sharing. Two features characterize such a system: 1) ...
Ying Cai, Ashwin Natarajan, Johnny Wong
« Prev « First page 2741 / 2798 Last » Next »