Sciweavers

212 search results - page 41 / 43
» Learning the task allocation game
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 4 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
95
Voted
CVPR
2007
IEEE
15 years 11 months ago
Beyond bottom-up: Incorporating task-dependent influences into a computational model of spatial attention
A critical function in both machine vision and biological vision systems is attentional selection of scene regions worthy of further analysis by higher-level processes such as obj...
Robert J. Peters, Laurent Itti
IJDSN
2006
132views more  IJDSN 2006»
14 years 9 months ago
Using Misbehavior to Analyze Strategic versus Aggregate Energy Minimization in Wireless Sensor Networks
Abstract-- We present a novel formulation of the problem of energy misbehavior and develop an analytical framework for quantifying its impact on other nodes. Specifically, we formu...
Rajgopal Kannan, Shuangqing Wei, Vasu Chakravarthy...
JAIR
2007
113views more  JAIR 2007»
14 years 9 months ago
Chain: A Dynamic Double Auction Framework for Matching Patient Agents
In this paper we present and evaluate a general framework for the design of truthful auctions for matching agents in a dynamic, two-sided market. A single commodity, such as a res...
Jonathan Bredin, David C. Parkes, Quang Duong
77
Voted
SIGECOM
2006
ACM
107views ECommerce» more  SIGECOM 2006»
15 years 3 months ago
Empirical mechanism design: methods, with application to a supply-chain scenario
Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with ...
Yevgeniy Vorobeychik, Christopher Kiekintveld, Mic...