Sciweavers

2814 search results - page 451 / 563
» Competitive Analysis of Distributed Algorithms
Sort
View
ASIAN
2007
Springer
126views Algorithms» more  ASIAN 2007»
14 years 3 months ago
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Abstract. This paper is concerned about relating formal and computational models of cryptography in case of active adversaries when formal security analysis is done with first ord...
Gergei Bana, Koji Hasebe, Mitsuhiro Okada
ATAL
2007
Springer
14 years 3 months ago
A computational characterization of multiagent games with fallacious rewards
Agents engaged in noncooperative interaction may seek to achieve a Nash equilibrium; this requires that agents be aware of others’ rewards. Misinformation about rewards leads to...
Ariel D. Procaccia, Jeffrey S. Rosenschein
ATAL
2007
Springer
14 years 3 months ago
On the robustness of preference aggregation in noisy environments
In an election held in a noisy environment, agents may unintentionally perturb the outcome by communicating faulty preferences. We investigate this setting by introducing a theore...
Ariel D. Procaccia, Jeffrey S. Rosenschein, Gal A....
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
14 years 3 months ago
Another investigation on tournament selection: modelling and visualisation
Tournament selection has been widely used and studied in evolutionary algorithms. To supplement the study of tournament selection, this paper provides several models describing th...
Huayang Xie, Mengjie Zhang, Peter Andreae
DATE
2006
IEEE
114views Hardware» more  DATE 2006»
14 years 3 months ago
A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap
Built-in self-repair (BISR) technique is gaining popular for repairing embedded memory cores in system-onchips (SOCs). To increase the utilization of memory redundancy, the BISR t...
Tsu-Wei Tseng, Jin-Fu Li, Da-Ming Chang