Sciweavers

4794 search results - page 149 / 959
» Trust-Based Mechanism Design
Sort
View
165
Voted
IJRR
2010
186views more  IJRR 2010»
15 years 2 months ago
The Highly Adaptive SDM Hand: Design and Performance Evaluation
The inherent uncertainty associated with unstructured environments makes establishing a successful grasp difficult. Traditional approaches to this problem involve hands that are c...
Aaron M. Dollar, Robert D. Howe
133
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Design and implementation of network puzzles
Abstract— Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provid...
Wu-chi Feng, Edward C. Kaiser, A. Luu
ICDE
1995
IEEE
180views Database» more  ICDE 1995»
16 years 5 months ago
Building an Integrated Active OODBMS: Requirements, Architecture, and Design Decisions
Active OODBMSs must provide e cient support for event detection, composition, and rule execution. Previous experience, reported here, building active capabilities on top of existi...
Alejandro P. Buchmann, Jürgen Zimmermann, Jos...
SIGECOM
2006
ACM
88views ECommerce» more  SIGECOM 2006»
15 years 9 months ago
Implementation with a bounded action space
While traditional mechanism design typically assumes isomorphism between the agents’ type- and action spaces, in many situations the agents face strict restrictions on their act...
Liad Blumrosen, Michal Feldman
WICSA
2001
15 years 5 months ago
A Compositional Approach for Constructing Connectors
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
Bridget Spitznagel, David Garlan