Sciweavers

436 search results - page 85 / 88
» The complexity of contract negotiation
Sort
View
ATAL
2008
Springer
13 years 9 months ago
Approximating power indices
Many multiagent domains where cooperation among agents is crucial to achieving a common goal can be modeled as coalitional games. However, in many of these domains, agents are une...
Yoram Bachrach, Evangelos Markakis, Ariel D. Proca...
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
ISPE
2003
13 years 8 months ago
Task-oriented engineering of coordinated software systems
ABSTRACT: In the context of Internet-based applications where heterogeneous, legacy entities should integrate and cooperate, the efficiency of the software production process is a ...
Enrico Denti, Andrea Omicini, Alessandro Ricci
SOFTVIS
2010
ACM
13 years 7 months ago
Heapviz: interactive heap visualization for program understanding and debugging
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structu...
Edward Aftandilian, Sean Kelley, Connor Gramazio, ...
COMPUTING
2008
94views more  COMPUTING 2008»
13 years 7 months ago
Two new methods for constructing double-ended priority queues from priority queues
We introduce two data-structural transformations to construct doubleended priority queues from priority queues. To apply our transformations the priority queues exploited must sup...
Amr Elmasry, Claus Jensen, Jyrki Katajainen