Sciweavers

646 search results - page 99 / 130
» Generalized efficiency bounds in distributed resource alloca...
Sort
View
JSAC
2007
132views more  JSAC 2007»
15 years 1 months ago
Lifetime maximization via cooperative nodes and relay deployment in wireless networks
— Extending lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributed nodes in wireless networks. Cooperative co...
Thanongsak Himsoon, W. Pam Siriwongpairat, Zhu Han...
ARGMAS
2006
Springer
15 years 3 months ago
Managing Social Influences Through Argumentation-Based Negotiation
Social influences play an important part in the actions that an individual agent may perform within a multi-agent society. However, the incomplete knowledge and the diverse and co...
Nishan C. Karunatillake, Nicholas R. Jennings, Iya...
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
14 years 11 months ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...
ATAL
2010
Springer
15 years 3 months ago
False-name-proofness with bid withdrawal
We study a more powerful variant of false-name manipulation in Internet auctions: an agent can submit multiple false-name bids, but then, once the allocation and payments have bee...
Mingyu Guo, Vincent Conitzer
GECCO
2006
Springer
137views Optimization» more  GECCO 2006»
15 years 5 months ago
A method for parameter calibration and relevance estimation in evolutionary algorithms
We present and evaluate a method for estimating the relevance and calibrating the values of parameters of an evolutionary algorithm. The method provides an information theoretic m...
Volker Nannen, A. E. Eiben