• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 23,767
Next 10 →

Table 6.23: Trust table based on Gratuitous Route

in Establishing Trust in Pure Ad-hoc Networks
by Asad Amir Pirzada, Chris McDonald

Table 1: Error rate (%) over optimal, l = 1 In table 2, we have used the single layer solution produced by Fang as the benchmark against which the solutions obtained by our three heuristics are compared. This table gives the average percentage by which the area of the solutions produced by our heuristics is less than that of the solutions produced by Fang. Our solutions have area 9 to 18% less.

in Minimum Area Joining of Compacted Cells
by Seonghun Cho, Sartaj Sahni
"... In PAGE 16: ... In our experiments, we considered only single layer and two layer routing. Table1 gives the average percentage by which the area of the single layer solutions generated by each of the heuristics exceeded the area of the single layer optimal solution. As is evident, each of the heuristics proposed in this paper gave noticeably better solutions than did Fang.... ..."

Table 7 Modi ed Hessians with trust region

in A Practical Algorithm For General Large Scale Nonlinear Optimization Problems
by Paul T. Boggs, Anthony J. Kearsley, Jon, Jon W. Tolle 1994
"... In PAGE 16: ... The measure of distance to feasibility (the {tube strategy), the nonmonotone updating of penalty parameter d, and the trust region strategy were essentially dormant during the solution process regardless of the iterates apos; proximity to the solution or to feasibility. In fact, the only evidence of our enhancements on the small number of CUTE test problems that we solved occurred when d was decreased slightly while solving the problem MANNE employing modi ed Hessians with a trust region strategy (see the third and fourth rows of Table7 ). It is noteworthy that the iterates that resulted from solving this problem with the penalty parameter arti cially held xed at d = 1 were identical to iterates that resulted for the adjusted d solution.... ..."
Cited by 27

Table 2 Routing solutions by the V4 router.

in unknown title
by unknown authors

Table. III. In this routing solution, the whole bandwidth re-

in ROUTING OF 40GB/S STREAMS IN WAVELENGTH-ROUTED HETEROGENEOUS OPTICAL NETWORKS, MAHER ALI. 1 Routing of 40Gb/s Streams in Wavelength-Routed Heterogeneous Optical Networks
by unknown authors

Table 1: Trust and trusting

in Draft: not for citation Cyber-trust
by Jonathan Cave, Lorenzo Valeri

Table 1. Cost and Trust Properties of Common Auctions. Key: IC

in Cost and Trust Issues in On-Line Auctions
by Lyle H. Ungar, David C. Parkes, Dean P. Foster 1998
"... In PAGE 4: ... Seller incentive-compatibility implies that a seller cannot bene#0Ct from manipulating the price of any item she is selling, either by the use of a shill #28a third party#29 or by placing a bid herself. We present these properties over a space of auction types in Table1 . The incentive-compatibility properties are standard #28see McAfee and McMillan #281987#29, for example#29.... In PAGE 6: ... Traditional considerations of the cognitive costs of auctions include the cost of strategic bidding in a non-incentive compatible auction. Clearly, incentive- compatible auctions require less computation by bidders than auctions which are not incentive-compatible, and thus are preferable #28I C B , Table1 #29. Estimating howmuch other bidders are willing to pay #28in order to bid slightly more than what one thinks the second highest bidder will bid#29 is not easy, although in agent-mediated auctions this cost can be transferred from a human participant to its bidding agent, and is less important than in traditional auctions.... In PAGE 7: ... A bidding agent only needs to know the true value when other buyers have similar reservation prices. We assume that it takes less e#0Bort for a buyer to place bounds on her value for a good than it does to compute her exact value for a good, and therefore prefer auctions that are #5Creservation-price- not-necessary quot; #28 nRP, Table1 #29. Communication costs in on-line auctions are muchlower than in o#0B-line auc- tions #28Beam et al.... In PAGE 7: ... An institutional solution to untrusted auctioneers in on-line Vickrey auctions is to provide trust-certi#0Ced third parties that operate the auctions. The English auction is also susceptible to seller manipulation, but strategic action is not risk-free, and requires the help of a third-party, known as a shill #28I C S , Table1... In PAGE 8: ... The auction should be buyer- incentive-compatible #28I C B #29 to make strategic bidding unnecessary, and reservation- price-not-necessary #28nRP#29 to enable progressive reasoning. We can see from Table1 that the two auction formats with these properties #28ignoring the redun- dant ascending second-price auction#29 are the ascending #0Crst-price and descend- ing second-price auctions. Even with a trusted auctioneer, the Vickrey auction is not suitable because we wish to avoid the high cognitive cost of computing the reservation price for every auction.... ..."
Cited by 8

Table 2: Solution data for the Sioux Falls network. Entropy value # Routes # Routes/O{D pair

in Most Likely Traffic Equilibrium Route Flows - Analysis And Computation
by T. Larsson, J. T. Lundgren, M. Patriksson, C. Rydergren
"... In PAGE 12: ...3 and 20 CPU seconds, respectively. In Table2 the number of equilibrium routes, the number of equilibrium routes per O{D pair, and the entropy value for the route ow solution are presented for the DSD, FW, and the most likely route ow solution (the number in the parenthesis is the number of enumerated equilibrium routes). Table 2: Solution data for the Sioux Falls network.... ..."

Table 5: Solution data for the Linkoping network. Entropy value # Routes # Routes/O{D pair

in Most Likely Traffic Equilibrium Route Flows - Analysis And Computation
by T. Larsson, J. T. Lundgren, M. Patriksson, C. Rydergren
"... In PAGE 13: ... The computational time for the route enumeration and the solution of the entropy problem is 64 and 970 CPU seconds, respectively. The number of equilibrium routes with signi cant route ow, the number of routes per O{D pair and the entropy value are given in Table5 . Although... ..."

Table 1. Operational requirements of the surveyed secure ad hoc routing solutions.

in Abstract
by Patroklos G. Argyroudis
"... In PAGE 25: ...The surveyed protocols base their proposed solutions to the problem of secure ad hoc routing on certain assumptions and operational requirements. Table1 summarizes the results of the comparison regarding this aspect and forms a basis for the discussion in this section. Table 1.... ..."
Next 10 →
Results 1 - 10 of 23,767
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University