Sciweavers

11588 search results - page 2269 / 2318
» Will They Like This
Sort
View
USS
2010
13 years 6 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
VRST
2010
ACM
13 years 6 months ago
Automatic registration of multiple projectors on swept surfaces
In this paper, we present the first method to geometrically register multiple projectors on a swept surface (e.g. a truncated dome) using a single uncalibrated camera without usin...
Behzad Sajadi, Aditi Majumder
WAOA
2010
Springer
236views Algorithms» more  WAOA 2010»
13 years 6 months ago
The Power of Uncertainty: Bundle-Pricing for Unit-Demand Customers
We study an extension of the unit-demand pricing problem in which the seller may offer bundles of items. If a customer buys such a bundle she is guaranteed to get one item out of i...
Patrick Briest, Heiko Röglin
WAW
2010
Springer
311views Algorithms» more  WAW 2010»
13 years 6 months ago
Game-Theoretic Models of Information Overload in Social Networks
We study the effect of information overload on user engagement in an asymmetric social network like Twitter. We introduce simple game-theoretic models that capture rate competition...
Christian Borgs, Jennifer T. Chayes, Brian Karrer,...
WIOPT
2010
IEEE
13 years 6 months ago
Routing games : From egoism to altruism
The paper studies the routing in the network shared by several users. Each user seeks to optimize either its own performance or some combination between its own performance and tha...
Amar Prakash Azad, Eitan Altman, Rachid El Azouzi
« Prev « First page 2269 / 2318 Last » Next »