Sciweavers

274 search results - page 36 / 55
» Reducing truth-telling online mechanisms to online optimizat...
Sort
View
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
14 years 28 days ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne
INFOCOM
2010
IEEE
13 years 5 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
CONEXT
2006
ACM
14 years 1 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford
HICSS
2003
IEEE
122views Biometrics» more  HICSS 2003»
14 years 21 days ago
Managing Quality Uncertainty Through Contingency Pricing
We analyze quality-contingent prices as a mechanism for mitigating the effects of quality uncertainty in e-commerce and IT goods services. A contingency pricing contract specifie...
Hemant K. Bhargava, Shankar Sundaresan
SIGECOM
2008
ACM
127views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Posted prices vs. negotiations: an asymptotic analysis
Full revelation of private values is impractical in many large-scale markets, where posted price mechanisms are a simpler alternative. In this work, we compare the asymptotic beha...
Liad Blumrosen, Thomas Holenstein