Sciweavers

3732 search results - page 705 / 747
» Ubiquitous Computing for the Public
Sort
View
AAIM
2009
Springer
123views Algorithms» more  AAIM 2009»
14 years 4 months ago
Efficiently Generating k-Best Solutions to Procurement Auctions
: © Efficiently Generating k-Best Solutions to Procurement Auctions Andrew Byde, Terence Kelly, Yunhong Zhou, Robert Tarjan HP Laboratories HPL-2009-163 procurement, auctions, dec...
Andrew Byde, Terence Kelly, Yunhong Zhou, Robert E...
CIARP
2009
Springer
14 years 4 months ago
3D and Appearance Modeling from Images
This paper gives an overview of works done in our group on 3D and appearance modeling of objects, from images. The backbone of our approach is to use what we consider as the princi...
Peter F. Sturm, Amaël Delaunoy, Pau Gargallo,...
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
IMC
2009
ACM
14 years 4 months ago
Characterizing VLAN-induced sharing in a campus network
Many enterprise, campus, and data-center networks have complex layer-2 virtual LANs (“VLANs”) below the IP layer. The interaction between layer-2 and IP topologies in these VL...
Muhammad Mukarram Bin Tariq, Ahmed Mansy, Nick Fea...
IMC
2009
ACM
14 years 4 months ago
IXPs: mapped?
Internet exchange points (IXPs) are an important ingredient of the Internet AS-level ecosystem—a logical fabric of the Internet made up of about 30,000 ASes and their mutual bus...
Brice Augustin, Balachander Krishnamurthy, Walter ...