Sciweavers

412 search results - page 53 / 83
» Utility maximization in peer-to-peer systems
Sort
View
DRM
2004
Springer
14 years 4 months ago
Analysis of an incentives-based secrets protection system
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the con...
N. Boris Margolin, Matthew Wright, Brian Neil Levi...
ATAL
2007
Springer
14 years 5 months ago
Multiagent learning in adaptive dynamic systems
Classically, an approach to the multiagent policy learning supposed that the agents, via interactions and/or by using preliminary knowledge about the reward functions of all playe...
Andriy Burkov, Brahim Chaib-draa
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
14 years 5 months ago
Continuous-time behavioral portfolio selection
This paper formulates and studies a general continuous-time behavioral portfolio selection model under Kahneman and Tversky's (cumulative) prospect theory, featuring S-shaped...
Hanqing Jin, Xun Yu Zhou
GLOBECOM
2007
IEEE
14 years 5 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
PRDC
2008
IEEE
14 years 5 months ago
SOQ: A Service-Oriented Quorum-Based Protocol for Resilient Real-Time Communication in Partitionable Networks
We consider efficient real-time communication mechanisms for applications in unreliable and partitionable networks, where network partitions can occur unpredictably and nodes can ...
Bo Zhang, Binoy Ravindran