Sciweavers

116 search results - page 20 / 24
» An adaptive strategy for minority games
Sort
View
OTM
2007
Springer
14 years 25 days ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
SAB
2010
Springer
128views Optimization» more  SAB 2010»
13 years 5 months ago
Simulation of How Neuromodulation Influences Cooperative Behavior
Abstract. Neuromodulators can have a strong effect on how organisms cooperate and compete for resources. To better understand the effect of neuromodulation on cooperative behavior,...
Andrew Zaldivar, Derrik E. Asher, Jeffrey L. Krich...
ATAL
2008
Springer
13 years 8 months ago
Social reward shaping in the prisoner's dilemma
Reward shaping is a well-known technique applied to help reinforcement-learning agents converge more quickly to nearoptimal behavior. In this paper, we introduce social reward sha...
Monica Babes, Enrique Munoz de Cote, Michael L. Li...
ICCBR
2010
Springer
13 years 10 months ago
Case-Based Plan Diversity
The concept of diversity was successfully introduced for recommender-systems. By displaying results that are not only similar to a target problem but also diverse among themselves,...
Alexandra Coman, Héctor Muñoz-Avila
LATIN
2010
Springer
14 years 1 months ago
The Size and Depth of Layered Boolean Circuits
We consider the relationship between size and depth for layered Boolean circuits, synchronous circuits and planar circuits as well as classes of circuits with small separators. In ...
Anna Gál, Jing-Tang Jang