Sciweavers

449 search results - page 15 / 90
» Intention-Disguised Algorithmic Trading
Sort
View
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
14 years 1 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
ICMAS
2000
13 years 8 months ago
Using Similarity Criteria to Make Negotiation Trade-Offs
This paper addresses the issues involved in software agents making trade-offs during automated negotiations in which they have information uncertainty and resource limitations. In...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 2 months ago
Analysis of micro-behavior and bounded rationality in double auction markets using co-evolutionary GP
We investigate the dynamics of trader behaviors using a co-evolutionary genetic programming system to simulate a double-auction market. The objective of this study is twofold. Fir...
Shu-Heng Chen, Ren-Jie Zeng, Tina Yu
CEC
2007
IEEE
14 years 1 months ago
Evolving the best-response strategy to decide when to make a proposal
— This paper designed and developed negotiation agents with the distinguishing features of 1) conducting continuous time negotiation rather than discrete time negotiation, 2) lea...
Bo An, Kwang Mong Sim, Victor R. Lesser
SIGECOM
2005
ACM
90views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
ICE: an iterative combinatorial exchange
We present the first design for a fully expressive iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive ...
David C. Parkes, Ruggiero Cavallo, Nick Elprin, Ad...