Sciweavers

6599 search results - page 1195 / 1320
» Towards a Theory of Information
Sort
View
JSAC
2008
95views more  JSAC 2008»
14 years 10 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
JSAC
2008
86views more  JSAC 2008»
14 years 10 months ago
Distributed function calculation and consensus using linear iterative strategies
Given an arbitrary network of interconnected nodes, we develop and analyze a distributed strategy that enables a subset of the nodes to calculate any given function of the node val...
Shreyas Sundaram, Christoforos N. Hadjicostis
JCSS
2006
77views more  JCSS 2006»
14 years 10 months ago
Sequential predictions based on algorithmic complexity
This paper studies sequence prediction based on the monotone Kolmogorov complexity Km=-log m, i.e. based on universal deterministic/one-part MDL. m is extremely close to Solomonof...
Marcus Hutter
JTAER
2008
111views more  JTAER 2008»
14 years 10 months ago
The Impact of Radio Frequency Identification (RFID) Investment Announcements on the Market Value of the Firm
This paper examines the impact of RFID investment announcements on the market value of the firms and explores industry effects of the positive abnormal returns to firms making the...
Bong-Keun Jeong, Ying Lu
DSS
2007
86views more  DSS 2007»
14 years 10 months ago
Efficiency of critical incident management systems: Instrument development and validation
There is much literature in the area of emergency response management systems. Even so, there is in general a lacuna of literature that deals with the issue of measuring the effec...
Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu J....
« Prev « First page 1195 / 1320 Last » Next »