Sciweavers

4794 search results - page 129 / 959
» Trust-Based Mechanism Design
Sort
View
92
Voted
ATAL
2010
Springer
15 years 4 months ago
Internal implementation
We introduce a constrained mechanism design setting called internal implementation, in which the mechanism designer is explicitly modeled as a player in the game of interest. This...
Ashton Anderson, Yoav Shoham, Alon Altman
166
Voted
ISCA
2012
IEEE
243views Hardware» more  ISCA 2012»
13 years 6 months ago
BlockChop: Dynamic squash elimination for hybrid processor architecture
Hybrid processors are HW/SW co-designed processors that leverage blocked-execution, the execution of regions of instructions as atomic blocks, to facilitate aggressive speculative...
Jason Mars, Naveen Kumar
104
Voted
NSDI
2008
15 years 6 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
145
Voted
LADC
2007
Springer
15 years 9 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
MM
2006
ACM
125views Multimedia» more  MM 2006»
15 years 9 months ago
The design of a real-time, multimodal biofeedback system for stroke patient rehabilitation
This paper presents a novel real-time, multi-modal biofeedback system for stroke patient therapy. The problem is important as traditional mechanisms of rehabilitation are monotono...
Yinpeng Chen, He Huang, Weiwei Xu, Richard Isaac W...