Sciweavers

1062 search results - page 163 / 213
» Game Networks
Sort
View
ICNP
2005
IEEE
14 years 2 months ago
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems
Peer-to-peer (P2P) anonymous communication systems are vulnerable to free-riders, peers that use the system while providing little or no service to others and whose presence limit...
Daniel R. Figueiredo, Jonathan K. Shapiro, Donald ...
CIMCA
2008
IEEE
14 years 3 months ago
Deploying Neural-Network-Based Models for Dynamic Pricing in Supply Chain Management
With the advent of e-Commerce, enterprises can no longer rely on static business strategies. They have to be able to cope in dynamic and uncertain electronic environments, especia...
Yevgeniya Kovalchuk, Maria Fasli
TCS
2008
13 years 8 months ago
Cleaning a network with brushes
Following the decontamination metaphor for searching a graph, we introduce a cleaning process, which is related to both the chip-firing game and edge searching. Brushes (instead o...
Margaret-Ellen Messinger, Richard J. Nowakowski, P...
JACM
2002
107views more  JACM 2002»
13 years 8 months ago
Paradoxes in distributed decisions on optimal load balancing for networks of homogeneous computers
In completely symmetric systems that have homogeneous nodes (hosts, computers, or processors) with identical arrival processes, an optimal static load balancing scheme does not in...
Hisao Kameda, Odile Pourtallier
SIGECOM
2006
ACM
88views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
Implementation with a bounded action space
While traditional mechanism design typically assumes isomorphism between the agents’ type- and action spaces, in many situations the agents face strict restrictions on their act...
Liad Blumrosen, Michal Feldman