Sciweavers

1068 search results - page 186 / 214
» Group Dominant Strategies
Sort
View
JCP
2007
73views more  JCP 2007»
14 years 9 months ago
Investigating Shill Bidding Behaviour Involving Colluding Bidders
Abstract— Shill bidding is where spurious bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. Trevathan and Re...
Jarrod Trevathan, Wayne Read
TSP
2008
113views more  TSP 2008»
14 years 9 months ago
Covariance Matrix Estimation With Heterogeneous Samples
We consider the problem of estimating the covariance matrix of an observation vector, using heterogeneous training samples, i.e., samples whose covariance matrices are not exactly ...
Olivier Besson, Stéphanie Bidon, Jean-Yves ...
CCR
2004
120views more  CCR 2004»
14 years 9 months ago
MAC-layer anycasting in ad hoc networks
A wireless ad hoc network is formed by a group of wireless hosts, without the use of any infrastructure. To enable communication, hosts cooperate among themselves to forward packet...
Romit Roy Choudhury, Nitin H. Vaidya
72
Voted
IDA
2002
Springer
14 years 9 months ago
A framework for modelling virus gene expression data
Short, high-dimensional, Multivariate Time Series (MTS) data are common in many fields such as medicine, finance and science, and any advance in modelling this kind of data would b...
Paul Kellam, Xiaohui Liu, Nigel J. Martin, Christi...
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
14 years 9 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...