Sciweavers

524 search results - page 99 / 105
» ets 2010
Sort
View
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 7 months ago
Capacitated Caching Games
Capacitated Caching (CC) Games are motivated by P2P and web caching applications, and involve nodes on a network making strategic choices regarding the content to replicate in the...
Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Na...
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 7 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
An Empirical Study on Content Bundling in BitTorrent Swarming System
Despite the tremendous success of BitTorrent, its swarming system suffers from a fundamental limitation: lower or no availability of unpopular contents. Recently, Menasche et al. ...
Jinyoung Han, Taejoong Chung, Seungbae Kim, Hyunch...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Sequential item pricing for unlimited supply
We investigate the extent to which price updates can increase the revenue of a seller with little prior information on demand. We study prior-free revenue maximization for a selle...
Maria-Florina Balcan, Florin Constantin
ICDT
2010
ACM
163views Database» more  ICDT 2010»
13 years 6 months ago
Composing Local-As-View Mappings
Schema mapping composition is a fundamental operation in schema management and data exchange. The mapping composition problem has been extensively studied for a number of mapping ...
Patricia Arocena, Ariel Fuxman, Renee Miller