Sciweavers

185 search results - page 33 / 37
» Transaction Mechanism Design in Decentralized Computational ...
Sort
View
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
ISVLSI
2007
IEEE
139views VLSI» more  ISVLSI 2007»
14 years 1 months ago
Automatic Retargeting of Binary Utilities for Embedded Code Generation
Contemporary SoC design involves the proper selection of cores from a reference platform. Such selection implies the design exploration of alternative CPUs, which requires the gen...
Alexandro Baldassin, Paulo Centoducatte, Sandro Ri...
SIGECOM
2004
ACM
93views ECommerce» more  SIGECOM 2004»
14 years 24 days ago
Strategic deliberation and truthful revelation: an impossibility result
In many market settings, agents do not know their preferences a priori. Instead, they may have to solve computationally complex optimization problems, query databases, or perform ...
Kate Larson, Tuomas Sandholm
ICS
2010
Tsinghua U.
13 years 9 months ago
The auction: optimizing banks usage in Non-Uniform Cache Architectures
The growing influence of wire delay in cache design has meant that access latencies to last-level cache banks are no longer constant. Non-Uniform Cache Architectures (NUCAs) have ...
Javier Lira, Carlos Molina, Antonio Gonzále...
ICPP
2009
IEEE
14 years 2 months ago
A Strategy-proof Pricing Scheme for Multiple Resource Type Allocations
Abstract—Resource sharing on the Internet is becoming increasingly pervasive. Recently, there is growing interest in distributed systems such as peer-to-peer and grid, with effor...
Yong Meng Teo, Marian Mihailescu