Sciweavers

1616 search results - page 30 / 324
» Robust game theory
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Compressive sensing meets game theory
We introduce the Multiplicative Update Selector and Estimator (MUSE) algorithm for sparse approximation in underdetermined linear regression problems. Given f = Φα∗ + µ, the ...
Sina Jafarpour, Robert E. Schapire, Volkan Cevher
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ICASSP
2009
IEEE
14 years 2 months ago
Game theory for precoding in a multi-user system: Bargaining for overall benefits
A precoding strategy for multi-user spectrum sharing over an interference channel is proposed and analyzed from a game-theoretic perspective. The proposed strategy is based on fi...
Jie Gao, Sergiy A. Vorobyov, Hai Jiang
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 2 months ago
Linear-Time Algorithms for Graphs of Bounded Rankwidth: A Fresh Look Using Game Theory
d Abstract) Alexander Langer, Peter Rossmanith, and Somnath Sikdar RWTH Aachen University, 52074 Aachen, Germany. We present an alternative proof of a theorem by Courcelle, Makowsk...
Alexander Langer, Peter Rossmanith, Somnath Sikdar
INFOCOM
2009
IEEE
14 years 2 months ago
Analysis of Adaptive Incentive Protocols for P2P Networks
— Incentive protocols play a crucial role to encourage cooperation among nodes in networking applications. The aim of this paper is to provide a general analytical framework to a...
Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu