Sciweavers

1316 search results - page 4 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
AMAI
2005
Springer
14 years 9 months ago
Auction design with costly preference elicitation
We consider auction design in a setting with costly preference elicitation. Well designed auctions can help to avoid unnecessary elicitation while determining efficient allocations...
David C. Parkes
CCS
2005
ACM
15 years 3 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
CIG
2006
IEEE
15 years 3 months ago
Capturing The Information Conveyed By Opponents' Betting Behavior in Poker
— This paper develops an approach to the capture and measurement of the information contained in opponents’ bet actions in seven card stud poker. We develop a causal model link...
Eric Saund
ISR
2010
14 years 8 months ago
Resource Allocation Policies for Personalization in Content Delivery Sites
One of the distinctive features of sites on the Internet is their ability to gather enormous amounts of information regarding their visitors, and use this information to enhance a...
Dengpan Liu, Sumit Sarkar, Chelliah Sriskandarajah
DCOSS
2011
Springer
13 years 9 months ago
Transmission Control Policy design for decentralized detection in sensor networks
—A Wireless Sensor Network (WSN) deployed for detection applications has the distinguishing feature that sensors cooperate to perform the detection task. Therefore, the decoupled...
Ashraf Tantawy, Xenofon D. Koutsoukos, Gautam Bisw...