Sciweavers

449 search results - page 84 / 90
» Intention-Disguised Algorithmic Trading
Sort
View
GECCO
2008
Springer
119views Optimization» more  GECCO 2008»
13 years 9 months ago
GP age-layer and crossover effects in bid-offer spread prediction
The bid-offer spread on equity options is a key source of profits for market makers, and a key cost for those trading in the options. Spreads are influenced by dynamic market f...
Amy Willis, Suneer Patel, Christopher D. Clack
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 8 months ago
CONCISE: Compressed 'n' Composable Integer Set
Bit arrays, or bitmaps, are used to significantly speed up set operations in several areas, such as data warehousing, information retrieval, and data mining, to cite a few. Howeve...
Alessandro Colantonio, Roberto Di Pietro
IJACT
2008
158views more  IJACT 2008»
13 years 8 months ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
JRTIP
2008
249views more  JRTIP 2008»
13 years 8 months ago
Model-based mapping of reconfigurable image registration on FPGA platforms
Abstract Image registration is a computationally intensive application in the medical imaging domain that places stringent requirements on performance and memory management efficie...
Mainak Sen, Yashwanth Hemaraj, William Plishker, R...
JSAC
2008
118views more  JSAC 2008»
13 years 8 months ago
Auction-Based Resource Allocation for Cooperative Communications
Abstract--Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper...
Jianwei Huang, Zhu Han, Mung Chiang, H. Vincent Po...