Sciweavers

894 search results - page 177 / 179
» Game Theory with Costly Computation
Sort
View
BROADNETS
2005
IEEE
14 years 3 months ago
Dual-link failure resiliency through backup link mutual exclusion
— Networks employ link protection to achieve fast recovery from link failures. While the first link failure can be protected using link protection, there are several alternative...
Amit Chandak, Srinivasan Ramasubramanian
ICRA
2005
IEEE
146views Robotics» more  ICRA 2005»
14 years 3 months ago
Probabilistic Gaze Imitation and Saliency Learning in a Robotic Head
— Imitation is a powerful mechanism for transferring knowledge from an instructor to a na¨ıve observer, one that is deeply contingent on a state of shared attention between the...
Aaron P. Shon, David B. Grimes, Chris Baker, Matth...
ICAIL
2003
ACM
14 years 2 months ago
Improving Legal Quality - an application report
Problems with legal quality will not only increase effort and costs of the law enforcement organisations, but also undermines the regulating power of the legislator. Unintended us...
Tom M. van Engers, Margherita R. Boekenoogen
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 2 months ago
Solving combinatorial exchanges: optimality via a few partial bids
We investigate the problem of matching buyers and sellers in a multi-item multi-unit combinatorial exchange so as to maximize either the surplus (revenue minus cost) or the tradin...
Anshul Kothari, Tuomas Sandholm, Subhash Suri
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
14 years 2 months ago
Using Enterprise Reference Models for Automated ISO 9000 Compliance Evaluation
A computational enterprise model representing key facets of an organization can be an effective tool. For example, a specific organization's quality management business proce...
Henry M. Kim, Mark S. Fox