id
stringlengths
4
4
title
stringlengths
22
113
abstract
stringlengths
282
2.29k
keyphrases
list
prmu
list
lvl-1
stringlengths
16.7k
86.2k
lvl-2
stringlengths
9.61k
76k
lvl-3
stringlengths
1.52k
23.8k
lvl-4
stringlengths
1.28k
19.2k
J-39
The Sequential Auction Problem on eBay: An Empirical Analysis and a Solution
Bidders on eBay have no dominant bidding strategy when faced with multiple auctions each offering an item of interest. As seen through an analysis of 1,956 auctions on eBay for a Dell E193FP LCD monitor, some bidders win auctions at prices higher than those of other available auctions, while others never win an auction...
[ "sequenti auction problem", "empir analysi", "bid strategi", "multipl auction", "strateg behavior", "commodit market", "comput simul", "market effect", "ebai", "option-base extens", "proxi-bid system", "trade opportun", "electron marketplac", "busi-to-consum auction", "autom trade agent"...
[ "P", "P", "P", "P", "P", "P", "P", "P", "U", "M", "M", "U", "U", "M", "U", "M", "U", "M" ]
The Sequential Auction Problem on eBay: An Empirical Analysis and a Solution ∗ Adam I. Juda Division of Engineering and Applied Sciences Harvard University, Harvard Business School ajuda@hbs.edu David C. Parkes Division of Engineering and Applied Sciences Harvard University parkes@eecs.harvard.edu ABSTRACT Bidders on e...
The Sequential Auction Problem on eBay: An Empirical Analysis and a Solution * ABSTRACT Bidders on eBay have no dominant bidding strategy when faced with multiple auctions each offering an item of interest. As seen through an analysis of 1,956 auctions on eBay for a Dell E193FP LCD monitor, some bidders win auctions at...
The Sequential Auction Problem on eBay: An Empirical Analysis and a Solution * ABSTRACT Bidders on eBay have no dominant bidding strategy when faced with multiple auctions each offering an item of interest. As seen through an analysis of 1,956 auctions on eBay for a Dell E193FP LCD monitor, some bidders win auctions at...
The Sequential Auction Problem on eBay: An Empirical Analysis and a Solution * ABSTRACT Bidders on eBay have no dominant bidding strategy when faced with multiple auctions each offering an item of interest. As seen through an analysis of 1,956 auctions on eBay for a Dell E193FP LCD monitor, some bidders win auctions at...
I-54
Approximate and Online Multi-Issue Negotiation
This paper analyzes bilateral multi-issue negotiation between self-interested autonomous agents. The agents have time constraints in the form of both deadlines and discount factors. There are m > 1 issues for negotiation where each issue is viewed as a pie of size one. The issues are indivisible (i.e., individual issue...
[ "approxim", "negoti", "time constraint", "equilibrium", "strategi", "rel error", "interact kei form", "multiag system", "disput agent", "gain from cooper", "protocol", "indivis issu", "game-theori", "onlin comput" ]
[ "P", "P", "P", "P", "P", "P", "M", "U", "M", "U", "U", "R", "U", "R" ]
Approximate and Online Multi-Issue Negotiation Shaheen S. Fatima Department of Computer Science University of Liverpool Liverpool L69 3BX, UK. shaheen@csc.liv.ac.uk Michael Wooldridge Department of Computer Science University of Liverpool Liverpool L69 3BX, UK. mjw@csc.liv.ac.uk Nicholas R. Jennings School of Electroni...
Approximate and Online Multi-Issue Negotiation ABSTRACT This paper analyzes bilateral multi-issue negotiation between selfinterested autonomous agents. The agents have time constraints in the form of both deadlines and discount factors. There are m> 1 issues for negotiation where each issue is viewed as a pie of size o...
Approximate and Online Multi-Issue Negotiation ABSTRACT This paper analyzes bilateral multi-issue negotiation between selfinterested autonomous agents. The agents have time constraints in the form of both deadlines and discount factors. There are m> 1 issues for negotiation where each issue is viewed as a pie of size o...
Approximate and Online Multi-Issue Negotiation ABSTRACT This paper analyzes bilateral multi-issue negotiation between selfinterested autonomous agents. The agents have time constraints in the form of both deadlines and discount factors. There are m> 1 issues for negotiation where each issue is viewed as a pie of size o...
I-68
On Opportunistic Techniques for Solving Decentralized Markov Decision Processes with Temporal Constraints
Decentralized Markov Decision Processes (DEC-MDPs) are a popular model of agent-coordination problems in domains with uncertainty and time constraints but very difficult to solve. In this paper, we improve a state-of-the-art heuristic solution method for DEC-MDPs, called OC-DEC-MDP, that has recently been shown to scal...
[ "decentr markov decis process", "decentr markov decis process", "tempor constraint", "agent-coordin problem", "valu function propag", "valu function propag", "decis-theoret model", "decentr partial observ markov decis process", "opportun cost", "polici iter", "rescu mission", "probabl function...
[ "P", "P", "P", "P", "P", "P", "M", "M", "U", "U", "U", "M", "U", "M", "U", "M" ]
On Opportunistic Techniques for Solving Decentralized Markov Decision Processes with Temporal Constraints Janusz Marecki and Milind Tambe Computer Science Department University of Southern California 941 W 37th Place, Los Angeles, CA 90089 {marecki, tambe}@usc. edu ABSTRACT Decentralized Markov Decision Processes (DEC-...
On Opportunistic Techniques for Solving Decentralized Markov Decision Processes with Temporal Constraints ABSTRACT Decentralized Markov Decision Processes (DEC-MDPs) are a popular model of agent-coordination problems in domains with uncertainty and time constraints but very difficult to solve. In this paper, we improve...
On Opportunistic Techniques for Solving Decentralized Markov Decision Processes with Temporal Constraints ABSTRACT Decentralized Markov Decision Processes (DEC-MDPs) are a popular model of agent-coordination problems in domains with uncertainty and time constraints but very difficult to solve. In this paper, we improve...
On Opportunistic Techniques for Solving Decentralized Markov Decision Processes with Temporal Constraints ABSTRACT Decentralized Markov Decision Processes (DEC-MDPs) are a popular model of agent-coordination problems in domains with uncertainty and time constraints but very difficult to solve. In this paper, we improve...
I-55
Searching for Joint Gains in Automated Negotiations Based on Multi-criteria Decision Making Theory
It is well established by conflict theorists and others that successful negotiation should incorporate creating value as well as claiming value. Joint improvements that bring benefits to all parties can be realised by (i) identifying attributes that are not of direct conflict between the parties, (ii) tradeoffs on attr...
[ "autom negoti", "negoti", "creat valu", "claim valu", "mediat", "ineffici compromis", "dilemma", "concess", "deadlock situat", "uncertainti", "incomplet inform", "mcdm", "integr negoti", "multi-criterion decis make" ]
[ "P", "P", "P", "P", "P", "U", "U", "U", "U", "U", "M", "U", "M", "M" ]
Searching for Joint Gains in Automated Negotiations Based on Multi-criteria Decision Making Theory Quoc Bao Vo School of Computer Science and IT RMIT University, Australia vqbao@cs.rmit.edu.au Lin Padgham School of Computer Science and IT RMIT University, Australia linpa@cs.rmit.edu.au ABSTRACT It is well established b...
Searching for Joint Gains in Automated Negotiations Based on Multi-criteria Decision Making Theory ABSTRACT It is well established by conflict theorists and others that successful negotiation should incorporate "creating value" as well as "claiming value." Joint improvements that bring benefits to all parties can be re...
Searching for Joint Gains in Automated Negotiations Based on Multi-criteria Decision Making Theory ABSTRACT It is well established by conflict theorists and others that successful negotiation should incorporate "creating value" as well as "claiming value." Joint improvements that bring benefits to all parties can be re...
Searching for Joint Gains in Automated Negotiations Based on Multi-criteria Decision Making Theory ABSTRACT It is well established by conflict theorists and others that successful negotiation should incorporate "creating value" as well as "claiming value." Joint improvements that bring benefits to all parties can be re...
J-38
Multi-Attribute Coalitional Games
We study coalitional games where the value of cooperation among the agents are solely determined by the attributes the agents possess, with no assumption as to how these attributes jointly determine this value. This framework allows us to model diverse economic interactions by picking the right attributes. We study the...
[ "multi-attribut coalit game", "coalit game", "cooper", "agent", "divers econom interact", "comput complex", "core", "shaplei valu", "graph", "multi-issu represent", "linear combin", "unrestrict aggreg of subgam", "polynomi function min-cost flow problem", "min-cost flow problem", "supera...
[ "P", "P", "P", "P", "P", "P", "P", "M", "U", "U", "U", "M", "U", "U", "M", "M", "R", "U" ]
Multi-Attribute Coalitional Games∗ Samuel Ieong † Computer Science Department Stanford University Stanford, CA 94305 sieong@cs.stanford.edu Yoav Shoham Computer Science Department Stanford University Stanford, CA 94305 shoham@cs.stanford.edu ABSTRACT We study coalitional games where the value of cooperation among the a...
Multi-Attribute Coalitional Games * t ABSTRACT We study coalitional games where the value of cooperation among the agents are solely determined by the attributes the agents possess, with no assumption as to how these attributes jointly determine this value. This framework allows us to model diverse economic interaction...
Multi-Attribute Coalitional Games * t ABSTRACT We study coalitional games where the value of cooperation among the agents are solely determined by the attributes the agents possess, with no assumption as to how these attributes jointly determine this value. This framework allows us to model diverse economic interaction...
Multi-Attribute Coalitional Games * t ABSTRACT We study coalitional games where the value of cooperation among the agents are solely determined by the attributes the agents possess, with no assumption as to how these attributes jointly determine this value. This framework allows us to model diverse economic interaction...
I-57
Rumours and Reputation: Evaluating Multi-Dimensional Trust within a Decentralised Reputation System
In this paper we develop a novel probabilistic model of computational trust that explicitly deals with correlated multi-dimensional contracts. Our starting point is to consider an agent attempting to estimate the utility of a contract, and we show that this leads to a model of computational trust whereby an agent must ...
[ "multi-dimension trust", "reput system", "correl", "dirichlet distribut", "rumour propag", "anonym", "overconfid", "trust model", "heurist", "probabl theori", "data fusion", "doubl count", "rumour propog" ]
[ "P", "P", "P", "P", "P", "P", "P", "R", "U", "M", "U", "U", "M" ]
Rumours and Reputation: Evaluating Multi-Dimensional Trust within a Decentralised Reputation System Steven Reece1 , Alex Rogers2 , Stephen Roberts1 and Nicholas R. Jennings2 1 Department of Engineering Science, University of Oxford, Oxford, OX1 3PJ, UK. {reece,sjrob}@robots. ox.ac.uk 2 Electronics and Computer Science,...
Rumours and Reputation: Evaluating Multi-Dimensional Trust within a Decentralised Reputation System ABSTRACT In this paper we develop a novel probabilistic model of computational trust that explicitly deals with correlated multi-dimensional contracts. Our starting point is to consider an agent attempting to estimate th...
Rumours and Reputation: Evaluating Multi-Dimensional Trust within a Decentralised Reputation System ABSTRACT In this paper we develop a novel probabilistic model of computational trust that explicitly deals with correlated multi-dimensional contracts. Our starting point is to consider an agent attempting to estimate th...
Rumours and Reputation: Evaluating Multi-Dimensional Trust within a Decentralised Reputation System ABSTRACT In this paper we develop a novel probabilistic model of computational trust that explicitly deals with correlated multi-dimensional contracts. Our starting point is to consider an agent attempting to estimate th...
I-43
Dynamics Based Control with an Application to Area-Sweeping Problems
In this paper we introduce Dynamics Based Control (DBC), an approach to planning and control of an agent in stochastic environments. Unlike existing approaches, which seek to optimize expected rewards (e.g., in Partially Observable Markov Decision Problems (POMDPs)), DBC optimizes system behavior towards specified syst...
[ "dynam base control", "dynam base control", "control", "area-sweep problem", "stochast environ", "partial observ markov decis problem", "system dynam", "extend markov track", "reward function", "multi-agent system", "target dynam", "action-select random", "tag game", "environ design level"...
[ "P", "P", "P", "P", "P", "P", "P", "P", "M", "M", "R", "U", "U", "M", "U", "M", "U" ]
Dynamics Based Control with an Application to Area-Sweeping Problems Zinovi Rabinovich Engineering and Computer Science Hebrew University of Jerusalem Jerusalem, Israel nomad@cs.huji.ac.il Jeffrey S. Rosenschein Engineering and Computer Science Hebrew University of Jerusalem Jerusalem, Israel jeff@cs.huji.ac.il Gal A. ...
Dynamics Based Control with an Application to Area-Sweeping Problems ABSTRACT In this paper we introduce Dynamics Based Control (DBC), an approach to planning and control of an agent in stochastic environments. Unlike existing approaches, which seek to optimize expected rewards (e.g., in Partially Observable Markov Dec...
Dynamics Based Control with an Application to Area-Sweeping Problems ABSTRACT In this paper we introduce Dynamics Based Control (DBC), an approach to planning and control of an agent in stochastic environments. Unlike existing approaches, which seek to optimize expected rewards (e.g., in Partially Observable Markov Dec...
Dynamics Based Control with an Application to Area-Sweeping Problems ABSTRACT In this paper we introduce Dynamics Based Control (DBC), an approach to planning and control of an agent in stochastic environments. Unlike existing approaches, which seek to optimize expected rewards (e.g., in Partially Observable Markov Dec...
I-42
A Complete Distributed Constraint Optimization Method For Non-Traditional Pseudotree Arrangements
Distributed Constraint Optimization (DCOP) is a general framework that can model complex problems in multi-agent systems. Several current algorithms that solve general DCOP instances, including ADOPT and DPOP, arrange agents into a traditional pseudotree structure. We introduce an extension to the DPOP algorithm that h...
[ "distribut constraint optim", "pseudotre arrang", "agent", "maximum sequenti path cost", "cross-edg pseudotre", "multi-agent system", "edg-travers heurist", "job shop schedul", "resourc alloc", "teamwork coordin", "multi-valu util function", "global util", "distribut constraint satisfact and...
[ "P", "P", "P", "P", "P", "M", "M", "U", "U", "U", "U", "U", "M", "U" ]
A Complete Distributed Constraint Optimization Method For Non-Traditional Pseudotree Arrangements∗ James Atlas Computer and Information Sciences University of Delaware Newark, DE 19716 atlas@cis.udel.edu Keith Decker Computer and Information Sciences University of Delaware Newark, DE 19716 decker@cis.udel.edu ABSTRACT ...
A Complete Distributed Constraint Optimization Method For Non-Traditional Pseudotree Arrangements * ABSTRACT Distributed Constraint Optimization (DCOP) is a general framework that can model complex problems in multi-agent systems. Several current algorithms that solve general DCOP instances, including ADOPT and DPOP, a...
A Complete Distributed Constraint Optimization Method For Non-Traditional Pseudotree Arrangements * ABSTRACT Distributed Constraint Optimization (DCOP) is a general framework that can model complex problems in multi-agent systems. Several current algorithms that solve general DCOP instances, including ADOPT and DPOP, a...
A Complete Distributed Constraint Optimization Method For Non-Traditional Pseudotree Arrangements * ABSTRACT Distributed Constraint Optimization (DCOP) is a general framework that can model complex problems in multi-agent systems. Several current algorithms that solve general DCOP instances, including ADOPT and DPOP, a...
I-56
Unifying Distributed Constraint Algorithms in a BDI Negotiation Framework
This paper presents a novel, unified distributed constraint satisfaction framework based on automated negotiation. The Distributed Constraint Satisfaction Problem (DCSP) is one that entails several agents to search for an agreement, which is a consistent combination of actions that satisfies their mutual constraints in...
[ "constraint", "algorithm", "bdi", "negoti", "distribut constraint satisfact problem", "dcsp", "share environ", "uma", "backtrack", "mediat", "resourc restrict", "privaci requir", "belief-desireintent model", "agent negoti" ]
[ "P", "P", "P", "P", "P", "P", "P", "P", "U", "U", "U", "U", "M", "R" ]
Unifying Distributed Constraint Algorithms in a BDI Negotiation Framework Bao Chau Le Dinh and Kiam Tian Seow School of Computer Engineering Nanyang Technological University Republic of Singapore {ledi0002,asktseow}@ntu. edu.sg ABSTRACT This paper presents a novel, unified distributed constraint satisfaction framework ...
Unifying Distributed Constraint Algorithms in a BDI Negotiation Framework ABSTRACT This paper presents a novel, unified distributed constraint satisfaction framework based on automated negotiation. The Distributed Constraint Satisfaction Problem (DCSP) is one that entails several agents to search for an agreement, whic...
Unifying Distributed Constraint Algorithms in a BDI Negotiation Framework ABSTRACT This paper presents a novel, unified distributed constraint satisfaction framework based on automated negotiation. The Distributed Constraint Satisfaction Problem (DCSP) is one that entails several agents to search for an agreement, whic...
Unifying Distributed Constraint Algorithms in a BDI Negotiation Framework ABSTRACT This paper presents a novel, unified distributed constraint satisfaction framework based on automated negotiation. The Distributed Constraint Satisfaction Problem (DCSP) is one that entails several agents to search for an agreement, whic...
I-52
A Unified and General Framework for Argumentation-based Negotiation
This paper proposes a unified and general framework for argumentation-based negotiation, in which the role of argumentation is formally analyzed. The framework makes it possible to study the outcomes of an argumentation-based negotiation. It shows what an agreement is, how it is related to the theories of the agents, w...
[ "framework", "argument", "argument", "negoti", "outcom", "theori", "agent", "argument-base negoti", "concess notion", "decis make mechan", "solut", "inform", "belief" ]
[ "P", "P", "P", "P", "P", "P", "P", "M", "R", "M", "U", "U", "U" ]
A Unified and General Framework for Argumentation-based Negotiation Leila Amgoud IRIT - CNRS 118, route de Narbonne 31062, Toulouse, France amgoud@irit.fr Yannis Dimopoulos University of Cyprus 75 Kallipoleos Str. PO Box 20537, Cyprus yannis@cs.ucy.ac.cy Pavlos Moraitis Paris-Descartes University 45 rue des Saints-Père...
A Unified and General Framework for Argumentation-based Negotiation ABSTRACT This paper proposes a unified and general framework for argumentation-based negotiation, in which the role of argumentation is formally analyzed. The framework makes it possible to study the outcomes of an argumentation-based negotiation. It s...
A Unified and General Framework for Argumentation-based Negotiation ABSTRACT This paper proposes a unified and general framework for argumentation-based negotiation, in which the role of argumentation is formally analyzed. The framework makes it possible to study the outcomes of an argumentation-based negotiation. It s...
A Unified and General Framework for Argumentation-based Negotiation ABSTRACT This paper proposes a unified and general framework for argumentation-based negotiation, in which the role of argumentation is formally analyzed. The framework makes it possible to study the outcomes of an argumentation-based negotiation. It s...
I-46
Modular Interpreted Systems
We propose a new class of representations that can be used for modeling (and model checking) temporal, strategic and epistemic properties of agents and their teams. Our representations borrow the main ideas from interpreted systems of Halpern, Fagin et al.; however, they are also modular and compact in the way concurre...
[ "modular interpret system", "model check", "model check", "open comput system", "tempor and strateg logic", "model methodolog", "multi-agent system", "higher level represent languag", "branch time", "comput tree logic ctl", "altern-time tempor logic", "kripk structur", "synchron concurr prog...
[ "P", "P", "P", "M", "R", "M", "M", "M", "U", "M", "M", "U", "M", "U" ]
Modular Interpreted Systems Wojciech Jamroga Department of Informatics Clausthal University of Technology, Germany wjamroga@in.tu-clausthal.de Thomas Ågotnes Department of Computer Engineering Bergen University College, Norway tag@hib.no ABSTRACT We propose a new class of representations that can be used for modeling (...
Modular Interpreted Systems ABSTRACT We propose a new class of representations that can be used for modeling (and model checking) temporal, strategic and epistemic properties of agents and their teams. Our representations borrow the main ideas from interpreted systems of Halpern, Fagin et al.; however, they are also mo...
Modular Interpreted Systems ABSTRACT We propose a new class of representations that can be used for modeling (and model checking) temporal, strategic and epistemic properties of agents and their teams. Our representations borrow the main ideas from interpreted systems of Halpern, Fagin et al.; however, they are also mo...
Modular Interpreted Systems ABSTRACT We propose a new class of representations that can be used for modeling (and model checking) temporal, strategic and epistemic properties of agents and their teams. Our representations borrow the main ideas from interpreted systems of Halpern, Fagin et al.; however, they are also mo...
I-47
Operational Semantics of Multiagent Interactions
The social stance advocated by institutional frameworks and most multi-agent system methodologies has resulted in a wide spectrum of organizational and communicative abstractions which have found currency in several programming frameworks and software platforms. Still, these tools and frameworks are designed to support...
[ "oper semant", "multiag interact", "institut framework", "organiz and commun abstract", "pre-defin abstract", "softwar architectur", "formal execut semant", "social interact", "organiz program languag", "multi-agent interact connector-base model", "softwar connector", "structur oper semant" ]
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "M", "R" ]
Operational Semantics of Multiagent Interactions Juan M. Serrano University Rey Juan Carlos C/Tulipan S/N Madrid, Spain juanmanuel.serrano@urjc.es Sergio Saugar University Rey Juan Carlos C/Tulipan S/N Madrid, Spain sergio.saugar@urjc.es ABSTRACT The social stance advocated by institutional frameworks and most multi-ag...
Operational Semantics of Multiagent Interactions ABSTRACT The social stance advocated by institutional frameworks and most multi-agent system methodologies has resulted in a wide spectrum of organizational and communicative abstractions which have found currency in several programming frameworks and software platforms....
Operational Semantics of Multiagent Interactions ABSTRACT The social stance advocated by institutional frameworks and most multi-agent system methodologies has resulted in a wide spectrum of organizational and communicative abstractions which have found currency in several programming frameworks and software platforms....
Operational Semantics of Multiagent Interactions ABSTRACT The social stance advocated by institutional frameworks and most multi-agent system methodologies has resulted in a wide spectrum of organizational and communicative abstractions which have found currency in several programming frameworks and software platforms....
I-53
A Randomized Method for the Shapley Value for the Voting Game
The Shapley value is one of the key solution concepts for coalition games. Its main advantage is that it provides a unique and fair solution, but its main problem is that, for many coalition games, the Shapley value cannot be determined in polynomial time. In particular, the problem of finding this value for the voting...
[ "uniqu and fair solut", "polynomi time", "approxim", "coalit format", "interact", "multi-agent system", "cooper game theori", "shaplei valu", "reach consensu mean", "randomis method", "gener function", "game-theori" ]
[ "P", "P", "P", "M", "U", "U", "M", "M", "U", "M", "M", "U" ]
A Randomized Method for the Shapley Value for the Voting Game Shaheen S. Fatima Department of Computer Science, University of Liverpool Liverpool L69 3BX, UK. shaheen@csc.liv.ac.uk Michael Wooldridge Department of Computer Science, University of Liverpool Liverpool L69 3BX, UK. mjw@csc.liv.ac.uk Nicholas R. Jennings Sc...
A Randomized Method for the Shapley Value for the Voting Game ABSTRACT The Shapley value is one of the key solution concepts for coalition games. Its main advantage is that it provides a unique and fair solution, but its main problem is that, for many coalition games, the Shapley value cannot be determined in polynomia...
A Randomized Method for the Shapley Value for the Voting Game ABSTRACT The Shapley value is one of the key solution concepts for coalition games. Its main advantage is that it provides a unique and fair solution, but its main problem is that, for many coalition games, the Shapley value cannot be determined in polynomia...
A Randomized Method for the Shapley Value for the Voting Game ABSTRACT The Shapley value is one of the key solution concepts for coalition games. Its main advantage is that it provides a unique and fair solution, but its main problem is that, for many coalition games, the Shapley value cannot be determined in polynomia...
I-45
Implementing Commitment-Based Interactions
Although agent interaction plays a vital role in MAS, and message-centric approaches to agent interaction have their drawbacks, present agent-oriented programming languages do not provide support for implementing agent interaction that is flexible and robust. Instead, messages are provided as a primitive building block...
[ "agent interact", "commit machin framework", "commit machin", "social commit", "bdi", "race condit", "commit-base interact", "messagecentr approach", "agent-orient program languag", "bdi-style plan", "interact goal", "turn track", "belief manag method", "herm design", "netbil interact", ...
[ "P", "P", "P", "P", "P", "P", "M", "M", "M", "M", "M", "M", "M", "U", "M", "M", "U" ]
Implementing Commitment-Based Interactions∗ Michael Winikoff School of Computer Science and IT RMIT University Melbourne, Australia michael.winikoff@rmit.edu.au ABSTRACT Although agent interaction plays a vital role in MAS, and messagecentric approaches to agent interaction have their drawbacks, present agent-oriented ...
Implementing Commitment-Based Interactions * ABSTRACT Although agent interaction plays a vital role in MAS, and messagecentric approaches to agent interaction have their drawbacks, present agent-oriented programming languages do not provide support for implementing agent interaction that is flexible and robust. Instead...
Implementing Commitment-Based Interactions * ABSTRACT Although agent interaction plays a vital role in MAS, and messagecentric approaches to agent interaction have their drawbacks, present agent-oriented programming languages do not provide support for implementing agent interaction that is flexible and robust. Instead...
Implementing Commitment-Based Interactions * ABSTRACT Although agent interaction plays a vital role in MAS, and messagecentric approaches to agent interaction have their drawbacks, present agent-oriented programming languages do not provide support for implementing agent interaction that is flexible and robust. Instead...
I-51
Learning and Joint Deliberation through Argumentation in Multi-Agent Systems
In this paper we will present an argumentation framework for learning agents (AMAL) designed for two purposes: (1) for joint deliberation, and (2) for learning from communication. The AMAL framework is completely based on learning from examples: the argument preference relation, the argument generation policy, and the ...
[ "joint deliber", "argument", "argument framework", "learn agent", "learn from commun", "multi-agent system", "argument protocol", "collabor", "group", "predict accuraci", "case-base polici", "multi-agent learn", "case-base reason" ]
[ "P", "P", "P", "P", "P", "M", "M", "U", "U", "U", "M", "M", "U" ]
Learning and Joint Deliberation through Argumentation in Multi-Agent Systems Santi Ontañón CCL, Cognitive Computing Lab Georgia Institute of Technology Atlanta, GA 303322/0280 santi@cc.gatech.edu Enric Plaza IIIA, Artificial Intelligence Research Institute CSIC, Spanish Council for Scientific Research Campus UAB, 08193...
Learning and Joint Deliberation through Argumentation in Multi-Agent Systems ABSTRACT In this paper we will present an argumentation framework for learning agents (AMAL) designed for two purposes: (1) for joint deliberation, and (2) for learning from communication. The AMAL framework is completely based on learning fro...
Learning and Joint Deliberation through Argumentation in Multi-Agent Systems ABSTRACT In this paper we will present an argumentation framework for learning agents (AMAL) designed for two purposes: (1) for joint deliberation, and (2) for learning from communication. The AMAL framework is completely based on learning fro...
Learning and Joint Deliberation through Argumentation in Multi-Agent Systems ABSTRACT In this paper we will present an argumentation framework for learning agents (AMAL) designed for two purposes: (1) for joint deliberation, and (2) for learning from communication. The AMAL framework is completely based on learning fro...
I-50
Agents, Beliefs, and Plausible Behavior in a Temporal Setting
Logics of knowledge and belief are often too static and inflexible to be used on real-world problems. In particular, they usually offer no concept for expressing that some course of events is more likely to happen than another. We address this problem and extend CTLK (computation tree logic with knowledge) with a notio...
[ "belief", "plausibl", "logic", "comput tree logic", "reason", "plausibl updat oper", "plausibl notion", "belief notion", "multi-agent system", "indistinguish", "framework", "semant", "tempor logic" ]
[ "P", "P", "P", "P", "P", "P", "R", "R", "U", "U", "U", "U", "R" ]
Agents, Beliefs, and Plausible Behavior in a Temporal Setting Nils Bulling and Wojciech Jamroga Department of Informatics, Clausthal University of Technology, Germany {bulling,wjamroga}@in. tu-clausthal. de ABSTRACT Logics of knowledge and belief are often too static and inflexible to be used on real-world problems. In...
Agents, Beliefs, and Plausible Behavior in a Temporal Setting ABSTRACT Logics of knowledge and belief are often too static and inflexible to be used on real-world problems. In particular, they usually offer no concept for expressing that some course of events is more likely to happen than another. We address this probl...
Agents, Beliefs, and Plausible Behavior in a Temporal Setting ABSTRACT Logics of knowledge and belief are often too static and inflexible to be used on real-world problems. In particular, they usually offer no concept for expressing that some course of events is more likely to happen than another. We address this probl...
Agents, Beliefs, and Plausible Behavior in a Temporal Setting ABSTRACT Logics of knowledge and belief are often too static and inflexible to be used on real-world problems. In particular, they usually offer no concept for expressing that some course of events is more likely to happen than another. We address this probl...
H-38
DiffusionRank: A Possible Penicillin for Web Spamming
While the PageRank algorithm has proven to be very effective for ranking Web pages, the rank scores of Web pages can be manipulated. To handle the manipulation problem and to cast a new insight on the Web structure, we propose a ranking algorithm called DiffusionRank. DiffusionRank is motivated by the heat diffusion ph...
[ "diffusionrank", "rank", "web spam", "pagerank", "web graph", "group-to-group relat", "link commun", "random graph", "keyword stuf", "link stuf", "machin learn", "link analysi", "seed select algorithm", "gaussian kernel smooth", "equal vote abil" ]
[ "P", "P", "P", "P", "P", "P", "P", "M", "U", "M", "U", "M", "M", "U", "M" ]
DiffusionRank: A Possible Penicillin for Web Spamming Haixuan Yang, Irwin King, and Michael R. Lyu Dept. of Computer Science and Engineering The Chinese University of Hong Kong Shatin, NT, Hong Kong {hxyang,king,lyu}@cse. cuhk.edu.hk ABSTRACT While the PageRank algorithm has proven to be very effective for ranking Web ...
DiffusionRank: A Possible Penicillin for Web Spamming ABSTRACT While the PageRank algorithm has proven to be very effective for ranking Web pages, the rank scores of Web pages can be manipulated. To handle the manipulation problem and to cast a new insight on the Web structure, we propose a ranking algorithm called Dif...
DiffusionRank: A Possible Penicillin for Web Spamming ABSTRACT While the PageRank algorithm has proven to be very effective for ranking Web pages, the rank scores of Web pages can be manipulated. To handle the manipulation problem and to cast a new insight on the Web structure, we propose a ranking algorithm called Dif...
DiffusionRank: A Possible Penicillin for Web Spamming ABSTRACT While the PageRank algorithm has proven to be very effective for ranking Web pages, the rank scores of Web pages can be manipulated. To handle the manipulation problem and to cast a new insight on the Web structure, we propose a ranking algorithm called Dif...
H-77
Automatic Extraction of Titles from General Documents using Machine Learning
In this paper, we propose a machine learning approach to title extraction from general documents. By general documents, we mean documents that can belong to any one of a number of specific genres, including presentations, book chapters, technical papers, brochures, reports, and letters. Previously, methods have been pr...
[ "machin learn", "search", "titl extract", "genr", "automat titl extract", "format inform", "document retriev", "languag independ", "metada of document", "linguist featur", "comparison between model", "model gener", "extract titl us", "classifi", "inform extract", "metada extract" ]
[ "P", "P", "P", "P", "P", "P", "P", "M", "M", "M", "M", "R", "M", "U", "R", "M" ]
Automatic Extraction of Titles from General Documents using Machine Learning Yunhua Hu1 Computer Science Department Xi``an Jiaotong University No 28, Xianning West Road Xi'an, China, 710049 yunhuahu@mail.xjtu.edu.cn Hang Li, Yunbo Cao Microsoft Research Asia 5F Sigma Center, No. 49 Zhichun Road, Haidian, Beijing, China...
Automatic Extraction of Titles from General Documents using Machine Learning ABSTRACT In this paper, we propose a machine learning approach to title extraction from general documents. By general documents, we mean documents that can belong to any one of a number of specific genres, including presentations, book chapter...
Automatic Extraction of Titles from General Documents using Machine Learning ABSTRACT In this paper, we propose a machine learning approach to title extraction from general documents. By general documents, we mean documents that can belong to any one of a number of specific genres, including presentations, book chapter...
Automatic Extraction of Titles from General Documents using Machine Learning ABSTRACT In this paper, we propose a machine learning approach to title extraction from general documents. By general documents, we mean documents that can belong to any one of a number of specific genres, including presentations, book chapter...
H-63
Location based Indexing Scheme for DAYS
Data dissemination through wireless channels for broadcasting information to consumers is becoming quite common. Many dissemination schemes have been proposed but most of them push data to wireless channels for general consumption. Push based broadcast [1] is essentially asymmetric, i.e., the volume of data being highe...
[ "index scheme", "index scheme", "index", "wireless channel", "locat depend data", "ldd", "wireless data dissemin", "locat base servic", "mobil user", "data broadcast system", "tree structur", "dai", "pull base data access", "wireless broadcast data map", "wireless data broadcast", "dat...
[ "P", "P", "P", "P", "P", "P", "R", "M", "M", "M", "M", "U", "M", "M", "R", "M" ]
Location based Indexing Scheme for DAYS Debopam Acharya and Vijay Kumar 1 Computer Science and Informatics University of Missouri-Kansas City Kansas City, MO 64110 dargc(kumarv)@umkc. edu ABSTRACT Data dissemination through wireless channels for broadcasting information to consumers is becoming quite common. Many disse...
Location based Indexing Scheme for DAYS ABSTRACT Data dissemination through wireless channels for broadcasting information to consumers is becoming quite common. Many dissemination schemes have been proposed but most of them push data to wireless channels for general consumption. Push based broadcast [1] is essentially...
Location based Indexing Scheme for DAYS ABSTRACT Data dissemination through wireless channels for broadcasting information to consumers is becoming quite common. Many dissemination schemes have been proposed but most of them push data to wireless channels for general consumption. Push based broadcast [1] is essentially...
Location based Indexing Scheme for DAYS ABSTRACT Data dissemination through wireless channels for broadcasting information to consumers is becoming quite common. Many dissemination schemes have been proposed but most of them push data to wireless channels for general consumption. Push based broadcast [1] is essentially...
H-88
Controlling Overlap in Content-Oriented XML Retrieval
The direct application of standard ranking techniques to retrieve individual elements from a collection of XML documents often produces a result set in which the top ranks are dominated by a large number of elements taken from a small number of highly relevant documents. This paper presents and evaluates an algorithm t...
[ "xml", "rank", "inex", "inform retriev", "xml ir", "baselin retriev", "sog quantiz", "xml cumul gain metric", "cumul gain", "ideal gain vector", "xcg metric reward retriev", "multitext system", "re-rank algorithm", "term frequenc vector", "prioriti queue", "time complex", "extend tre...
[ "P", "P", "P", "M", "M", "M", "U", "M", "U", "U", "M", "U", "R", "U", "U", "U", "U" ]
Controlling Overlap in Content-Oriented XML Retrieval Charles L. A. Clarke School of Computer Science, University of Waterloo, Canada claclark@plg.uwaterloo.ca ABSTRACT The direct application of standard ranking techniques to retrieve individual elements from a collection of XML documents often produces a result set in...
Controlling Overlap in Content-Oriented XML Retrieval ABSTRACT The direct application of standard ranking techniques to retrieve individual elements from a collection of XML documents often produces a result set in which the top ranks are dominated by a large number of elements taken from a small number of highly relev...
Controlling Overlap in Content-Oriented XML Retrieval ABSTRACT The direct application of standard ranking techniques to retrieve individual elements from a collection of XML documents often produces a result set in which the top ranks are dominated by a large number of elements taken from a small number of highly relev...
Controlling Overlap in Content-Oriented XML Retrieval ABSTRACT The direct application of standard ranking techniques to retrieve individual elements from a collection of XML documents often produces a result set in which the top ranks are dominated by a large number of elements taken from a small number of highly relev...
J-72
Applying Learning Algorithms to Preference Elicitation
We consider the parallels between the preference elicitation problem in combinatorial auctions and the problem of learning an unknown function from learning theory. We show that learning algorithms can be used as a basis for preference elicitation algorithms. The resulting elicitation algorithms perform a polynomial nu...
[ "learn", "learn algorithm", "learn", "prefer elicit", "parallel", "prefer elicit problem", "combinatori auction", "learn theori", "prefer elicit algorithm", "elicit algorithm", "polynomi", "result algorithm", "polynomi commun", "polynomi commun", "convers procedur", "combinatori auctio...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "R" ]
Applying Learning Algorithms to Preference Elicitation Sebastien M. Lahaie Division of Engineering and Applied Sciences Harvard University Cambridge, MA 02138 slahaie@eecs.harvard.edu David C. Parkes Division of Engineering and Applied Sciences Harvard University Cambridge, MA 02138 parkes@eecs.harvard.edu ABSTRACT We ...
Applying Learning Algorithms to Preference Elicitation ABSTRACT We consider the parallels between the preference elicitation problem in combinatorial auctions and the problem of learning an unknown function from learning theory. We show that learning algorithms can be used as a basis for preference elicitation algorith...
Applying Learning Algorithms to Preference Elicitation ABSTRACT We consider the parallels between the preference elicitation problem in combinatorial auctions and the problem of learning an unknown function from learning theory. We show that learning algorithms can be used as a basis for preference elicitation algorith...
Applying Learning Algorithms to Preference Elicitation ABSTRACT We consider the parallels between the preference elicitation problem in combinatorial auctions and the problem of learning an unknown function from learning theory. We show that learning algorithms can be used as a basis for preference elicitation algorith...
C-56
A Hierarchical Process Execution Support for Grid Computing
Grid is an emerging infrastructure used to share resources among virtual organizations in a seamless manner and to provide breakthrough computing power at low cost. Nowadays there are dozens of academic and commercial products that allow execution of isolated tasks on grids, but few products support the enactment of lo...
[ "hierarch process execut", "process execut", "grid comput", "distribut system", "distribut applic", "distribut process", "distribut schedul", "distribut execut", "distribut comput", "parallel comput", "parallel execut", "process descript", "grid architectur", "schedul algorithm", "proces...
[ "P", "P", "P", "M", "M", "R", "R", "R", "R", "M", "M", "M", "M", "M", "R", "M" ]
A Hierarchical Process Execution Support for Grid Computing Fábio R. L. Cicerre Institute of Computing State University of Campinas Campinas, Brazil fcicerre@ic.unicamp.br Edmundo R. M. Madeira Institute of Computing State University of Campinas Campinas, Brazil edmundo@ic.unicamp.br Luiz E. Buzato Institute of Computi...
A Hierarchical Process Execution Support for Grid Computing ABSTRACT Grid is an emerging infrastructure used to share resources among virtual organizations in a seamless manner and to provide breakthrough computing power at low cost. Nowadays there are dozens of academic and commercial products that allow execution of ...
A Hierarchical Process Execution Support for Grid Computing ABSTRACT Grid is an emerging infrastructure used to share resources among virtual organizations in a seamless manner and to provide breakthrough computing power at low cost. Nowadays there are dozens of academic and commercial products that allow execution of ...
A Hierarchical Process Execution Support for Grid Computing ABSTRACT Grid is an emerging infrastructure used to share resources among virtual organizations in a seamless manner and to provide breakthrough computing power at low cost. Nowadays there are dozens of academic and commercial products that allow execution of ...
C-42
Demonstration of Grid-Enabled Ensemble Kalman Filter Data Assimilation Methodology for Reservoir Characterization
Ensemble Kalman filter data assimilation methodology is a popular approach for hydrocarbon reservoir simulations in energy exploration. In this approach, an ensemble of geological models and production data of oil fields is used to forecast the dynamic response of oil wells. The Schlumberger ECLIPSE software is used fo...
[ "ensembl kalman filter", "data assimil methodolog", "hydrocarbon reservoir simul", "energi explor", "tigr grid comput environ", "tigr", "grid comput", "cyberinfrastructur develop project", "high perform comput", "tigr grid middlewar", "strateg applic area", "gridwai metaschedul", "pool licen...
[ "P", "P", "P", "P", "P", "P", "P", "U", "M", "M", "U", "M", "R", "U", "R", "U" ]
Demonstration of Grid-Enabled Ensemble Kalman Filter Data Assimilation Methodology for Reservoir Characterization Ravi Vadapalli High Performance Computing Center Texas Tech University Lubbock, TX 79409 001-806-742-4350 Ravi.Vadapalli@ttu.edu Ajitabh Kumar Department of Petroleum Engineering Texas A&M University Colleg...
Demonstration of Grid-Enabled Ensemble Kalman Filter Data Assimilation Methodology for Reservoir Characterization ABSTRACT Ensemble Kalman filter data assimilation methodology is a popular approach for hydrocarbon reservoir simulations in energy exploration. In this approach, an ensemble of geological models and produc...
Demonstration of Grid-Enabled Ensemble Kalman Filter Data Assimilation Methodology for Reservoir Characterization ABSTRACT Ensemble Kalman filter data assimilation methodology is a popular approach for hydrocarbon reservoir simulations in energy exploration. In this approach, an ensemble of geological models and produc...
Demonstration of Grid-Enabled Ensemble Kalman Filter Data Assimilation Methodology for Reservoir Characterization ABSTRACT Ensemble Kalman filter data assimilation methodology is a popular approach for hydrocarbon reservoir simulations in energy exploration. In this approach, an ensemble of geological models and produc...
J-66
Expressive Negotiation over Donations to Charities
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to donate more. Such negotiation is usually done in terms of matching offers, where one party promises to pay a certain amount if others pay a certa...
[ "express negoti", "donat to chariti", "negoti materi", "bid languag", "concav bid", "linear program", "quasilinear", "mechan design", "chariti support", "express chariti donat", "combinatori auction", "econom effici", "bid framework", "donat-clear", "threshold bid", "payment willing fu...
[ "P", "P", "P", "P", "P", "P", "P", "P", "M", "R", "U", "R", "M", "U", "M", "M", "U", "M" ]
Expressive Negotiation over Donations to Charities∗ Vincent Conitzer Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA conitzer@cs.cmu.edu Tuomas Sandholm Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA sandholm@cs.cmu.edu ABSTRACT When donating money to a (say, charitable)...
Expressive Negotiation over Donations to Charities ∗ ABSTRACT When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to donate more. Such negotiation is usually done in terms of matching offers, where on...
Expressive Negotiation over Donations to Charities ∗ ABSTRACT When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to donate more. Such negotiation is usually done in terms of matching offers, where on...
Expressive Negotiation over Donations to Charities ∗ ABSTRACT When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to donate more. Such negotiation is usually done in terms of matching offers, where on...
C-81
Adaptive Duty Cycling for Energy Harvesting Systems
Harvesting energy from the environment is feasible in many applications to ameliorate the energy limitations in sensor networks. In this paper, we present an adaptive duty cycling algorithm that allows energy harvesting sensor nodes to autonomously adjust their duty cycle according to the energy availability in the env...
[ "duti cycl", "energi harvest system", "energi harvest", "sensor network", "energi neutral oper", "environment energi", "power manag", "harvest-awar power manag", "perform scale", "duti cycl rate", "network latenc", "sampl frequenc", "solar panel", "energi track", "storag buffer", "powe...
[ "P", "P", "P", "P", "P", "P", "P", "M", "M", "M", "M", "U", "M", "M", "U", "M", "M" ]
Adaptive Duty Cycling for Energy Harvesting Systems Jason Hsu, Sadaf Zahedi, Aman Kansal, Mani Srivastava Electrical Engineering Department University of California Los Angeles {jasonh,kansal,szahedi,mbs} @ ee.ucla.edu Vijay Raghunathan NEC Labs America Princeton, NJ vijay@nec-labs.com ABSTRACT Harvesting energy from t...
Adaptive Duty Cycling for Energy Harvesting Systems {jasonh, kansal, szahedi, mbs} @ ee.ucla.edu vijay@nec-labs.com ABSTRACT Harvesting energy from the environment is feasible in many applications to ameliorate the energy limitations in sensor networks. In this paper, we present an adaptive duty cycling algorithm that ...
Adaptive Duty Cycling for Energy Harvesting Systems {jasonh, kansal, szahedi, mbs} @ ee.ucla.edu vijay@nec-labs.com ABSTRACT Harvesting energy from the environment is feasible in many applications to ameliorate the energy limitations in sensor networks. In this paper, we present an adaptive duty cycling algorithm that ...
Adaptive Duty Cycling for Energy Harvesting Systems {jasonh, kansal, szahedi, mbs} @ ee.ucla.edu vijay@nec-labs.com ABSTRACT Harvesting energy from the environment is feasible in many applications to ameliorate the energy limitations in sensor networks. In this paper, we present an adaptive duty cycling algorithm that ...
I-37
A Framework for Agent-Based Distributed Machine Learning and Data Mining
This paper proposes a framework for agent-based distributed machine learning and data mining based on (i) the exchange of meta-level descriptions of individual learning processes among agents and (ii) online reasoning about learning success and learning progress by learning agents. We present an abstract architecture t...
[ "agent", "distribut machin learn", "machin learn", "data mine", "individu learn process", "meta-reason", "distribut cluster applic", "framework and architectur", "unsupervis cluster", "bayesian classifi", "consensusbas method", "commun and coordin", "autonom learn agent", "histor inform", ...
[ "P", "P", "P", "P", "P", "P", "P", "R", "M", "U", "M", "M", "M", "U", "M" ]
A Framework for Agent-Based Distributed Machine Learning and Data Mining Jan Tozicka Gerstner Laboratory Czech Technical University Technick``a 2, Prague, 166 27 Czech Republic tozicka@labe.felk.cvut.cz Michael Rovatsos School of Informatics The University of Edinburgh Edinburgh EH8 9LE United Kingdom mrovatso@inf.ed.a...
A Framework for Agent-Based Distributed Machine Learning and Data Mining ABSTRACT This paper proposes a framework for agent-based distributed machine learning and data mining based on (i) the exchange of meta-level descriptions of individual learning processes among agents and (ii) online reasoning about learning succe...
A Framework for Agent-Based Distributed Machine Learning and Data Mining ABSTRACT This paper proposes a framework for agent-based distributed machine learning and data mining based on (i) the exchange of meta-level descriptions of individual learning processes among agents and (ii) online reasoning about learning succe...
A Framework for Agent-Based Distributed Machine Learning and Data Mining ABSTRACT This paper proposes a framework for agent-based distributed machine learning and data mining based on (i) the exchange of meta-level descriptions of individual learning processes among agents and (ii) online reasoning about learning succe...
C-80
Consistency-preserving Caching of Dynamic Database Content
With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe a middleware layer called Ganesh that reduces the volume of data transmitted without semantic interpretation of queries or results. It achie...
[ "databas content", "relat databas", "tempor local", "cach dynam databas content", "hash-base techniqu", "redund", "natur chunk boundari", "proxi", "jdbc driver", "resultset object", "bboard benchmark", "read-write oper", "reciperesultset", "content address storag", "relat databas system"...
[ "P", "P", "U", "R", "U", "U", "U", "U", "U", "U", "M", "U", "U", "M", "M", "R", "U", "U" ]
Consistency-preserving Caching of Dynamic Database Content∗ Niraj Tolia and M. Satyanarayanan Carnegie Mellon University {ntolia,satya}@cs. cmu.edu ABSTRACT With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffect...
Consistency-preserving Caching of Dynamic Database Content * ABSTRACT With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe a middleware layer called Ganesh that reduces the volume of data trans...
Consistency-preserving Caching of Dynamic Database Content * ABSTRACT With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe a middleware layer called Ganesh that reduces the volume of data trans...
Consistency-preserving Caching of Dynamic Database Content * ABSTRACT With the growing use of dynamic web content generated from relational databases, traditional caching solutions for throughput and latency improvements are ineffective. We describe a middleware layer called Ganesh that reduces the volume of data trans...
J-67
Mechanism Design for Online Real-Time Scheduling
For the problem of online real-time scheduling of jobs on a single processor, previous work presents matching upper and lower bounds on the competitive ratio that can be achieved by a deterministic algorithm. However, these results only apply to the non-strategic setting in which the jobs are released directly to the a...
[ "mechan design", "schedul", "competit ratio", "determinist algorithm", "non-strateg set", "deadlin", "determinist mechan", "job onlin schedul", "import ratio", "zero laxiti", "onlin algorithm", "quasi-linear function", "incent compat", "individu ration", "profit deviat", "monoton", "...
[ "P", "P", "P", "P", "P", "P", "P", "R", "M", "U", "R", "U", "M", "U", "U", "U", "U" ]
Mechanism Design for Online Real-Time Scheduling Ryan Porter∗ Computer Science Department Stanford University Stanford, CA 94305 rwporter@stanford.edu ABSTRACT For the problem of online real-time scheduling of jobs on a single processor, previous work presents matching upper and lower bounds on the competitive ratio th...
Mechanism Design for Online Real-Time Scheduling ABSTRACT For the problem of online real-time scheduling of jobs on a single processor, previous work presents matching upper and lower bounds on the competitive ratio that can be achieved by a deterministic algorithm. However, these results only apply to the non-strategi...
Mechanism Design for Online Real-Time Scheduling ABSTRACT For the problem of online real-time scheduling of jobs on a single processor, previous work presents matching upper and lower bounds on the competitive ratio that can be achieved by a deterministic algorithm. However, these results only apply to the non-strategi...
Mechanism Design for Online Real-Time Scheduling ABSTRACT For the problem of online real-time scheduling of jobs on a single processor, previous work presents matching upper and lower bounds on the competitive ratio that can be achieved by a deterministic algorithm. However, these results only apply to the non-strategi...
J-73
Competitive Algorithms for VWAP and Limit Order Trading
We introduce new online models for two important aspects of modern financial markets: Volume Weighted Average Price trading and limit order books. We provide an extensive study of competitive algorithms in these models and relate them to earlier online algorithms for stock trading.
[ "competit algorithm", "vwap", "onlin model", "modern financi market", "onlin algorithm", "stock trade", "volum weight averag price trade model", "limit order book trade model", "trade sequenc", "share", "market order", "onlin trade", "competit analysi" ]
[ "P", "P", "P", "P", "P", "P", "R", "R", "M", "U", "R", "R", "M" ]
Competitive Algorithms for VWAP and Limit Order Trading Sham M. Kakade Computer and Information Science University of Pennsylvania kakade@linc.cis.upenn.edu Michael Kearns Computer and Information Science University of Pennsylvania mkearns@cis.upenn.edu Yishay Mansour Computer Science Tel Aviv University mansour@post.t...
Competitive Algorithms for VWAP and Limit Order Trading ABSTRACT We introduce new online models for two important aspects of modern financial markets: Volume Weighted Average Price trading and limit order books. We provide an extensive study of competitive algorithms in these models and relate them to earlier online al...
Competitive Algorithms for VWAP and Limit Order Trading ABSTRACT We introduce new online models for two important aspects of modern financial markets: Volume Weighted Average Price trading and limit order books. We provide an extensive study of competitive algorithms in these models and relate them to earlier online al...
Competitive Algorithms for VWAP and Limit Order Trading ABSTRACT We introduce new online models for two important aspects of modern financial markets: Volume Weighted Average Price trading and limit order books. We provide an extensive study of competitive algorithms in these models and relate them to earlier online al...
C-57
Congestion Games with Load-Dependent Failures: Identical Resources
We define a new class of games, congestion games with load-dependent failures (CGLFs), which generalizes the well-known class of congestion games, by incorporating the issue of resource failures into congestion games. In a CGLF, agents share a common set of resources, where each resource has a cost and a probability of...
[ "congest game", "load-depend failur", "load-depend failur", "ident resourc", "failur probabl", "potenti function", "pure strategi nash equilibrium", "nash equilibrium", "nondecreas cost function", "localeffect game", "resourc cost function", "real-valu function", "load-depend resourc failur"...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "R", "M", "R" ]
Congestion Games with Load-Dependent Failures: Identical Resources Michal Penn Technion - IIT Haifa, Israel mpenn@ie.technion.ac.il Maria Polukarov Technion - IIT Haifa, Israel pmasha@tx.technion.ac.il Moshe Tennenholtz Technion - IIT Haifa, Israel moshet@ie.technion.ac.il ABSTRACT We define a new class of games, conge...
Congestion Games with Load-Dependent Failures: Identical Resources ABSTRACT We define a new class of games, congestion games with loaddependent failures (CGLFs), which generalizes the well-known class of congestion games, by incorporating the issue of resource failures into congestion games. In a CGLF, agents share a c...
Congestion Games with Load-Dependent Failures: Identical Resources ABSTRACT We define a new class of games, congestion games with loaddependent failures (CGLFs), which generalizes the well-known class of congestion games, by incorporating the issue of resource failures into congestion games. In a CGLF, agents share a c...
Congestion Games with Load-Dependent Failures: Identical Resources ABSTRACT We define a new class of games, congestion games with loaddependent failures (CGLFs), which generalizes the well-known class of congestion games, by incorporating the issue of resource failures into congestion games. In a CGLF, agents share a c...
H-62
Implicit User Modeling for Personalized Search
Information retrieval systems (e.g., web search engines) are critical for overcoming information overload. A major deficiency of existing retrieval systems is that they generally lack user modeling and are not adaptive to individual users, resulting in inherently non-optimal retrieval performance. For example, a touris...
[ "implicit user model", "user model", "person search", "inform retriev system", "retriev perform", "implicit feedback", "queri expans", "search accuraci", "user-center adapt inform retriev", "person web search", "interact ir", "queri refin", "person inform retriev", "interact retriev" ]
[ "P", "P", "P", "P", "P", "P", "P", "P", "M", "R", "U", "M", "R", "M" ]
Implicit User Modeling for Personalized Search Xuehua Shen, Bin Tan, ChengXiang Zhai Department of Computer Science University of Illinois at Urbana-Champaign ABSTRACT Information retrieval systems (e.g., web search engines) are critical for overcoming information overload. A major deficiency of existing retrieval syst...
Implicit User Modeling for Personalized Search ABSTRACT Information retrieval systems (e.g., web search engines) are critical for overcoming information overload. A major deficiency of existing retrieval systems is that they generally lack user modeling and are not adaptive to individual users, resulting in inherently ...
Implicit User Modeling for Personalized Search ABSTRACT Information retrieval systems (e.g., web search engines) are critical for overcoming information overload. A major deficiency of existing retrieval systems is that they generally lack user modeling and are not adaptive to individual users, resulting in inherently ...
Implicit User Modeling for Personalized Search ABSTRACT Information retrieval systems (e.g., web search engines) are critical for overcoming information overload. A major deficiency of existing retrieval systems is that they generally lack user modeling and are not adaptive to individual users, resulting in inherently ...
H-48
A New Approach for Evaluating Query Expansion: Query-Document Term Mismatch
The effectiveness of information retrieval (IR) systems is influenced by the degree of term overlap between user queries and relevant documents. Query-document term mismatch, whether partial or total, is a fact that must be dealt with by IR systems. Query Expansion (QE) is one method for dealing with term mismatch. IR ...
[ "evalu", "queri expans", "inform retriev", "relev document", "queri-document term mismatch", "inform search", "document expans", "document process" ]
[ "P", "P", "P", "P", "M", "M", "R", "R" ]
A New Approach for Evaluating Query Expansion: Query-Document Term Mismatch Tonya Custis Thomson Corporation 610 Opperman Drive St. Paul, MN tonya.custis@thomson.com Khalid Al-Kofahi Thomson Corporation 610 Opperman Drive St. Paul, MN khalid.al-kofahi@thomson.com ABSTRACT The effectiveness of information retrieval (IR)...
A New Approach for Evaluating Query Expansion: Query-Document Term Mismatch ABSTRACT The effectiveness of information retrieval (IR) systems is influenced by the degree of term overlap between user queries and relevant documents. Query-document term mismatch, whether partial or total, is a fact that must be dealt with ...
A New Approach for Evaluating Query Expansion: Query-Document Term Mismatch ABSTRACT The effectiveness of information retrieval (IR) systems is influenced by the degree of term overlap between user queries and relevant documents. Query-document term mismatch, whether partial or total, is a fact that must be dealt with ...
A New Approach for Evaluating Query Expansion: Query-Document Term Mismatch ABSTRACT The effectiveness of information retrieval (IR) systems is influenced by the degree of term overlap between user queries and relevant documents. Query-document term mismatch, whether partial or total, is a fact that must be dealt with ...
H-60
A Frequency-based and a Poisson-based Definition of the Probability of Being Informative
This paper reports on theoretical investigations about the assumptions underlying the inverse document frequency (idf). We show that an intuitive idf-based probability function for the probability of a term being informative assumes disjoint document events. By assuming documents to be independent rather than disjoint,...
[ "inform", "invers document frequenc", "invers document frequenc", "idf", "probabl function", "frequenc-base probabl", "poisson-base probabl", "document disjoint", "nois probabl", "inform retriev", "probabl theori", "collect space", "probabilist inform retriev", "poisson distribut", "info...
[ "P", "P", "P", "P", "P", "M", "M", "R", "M", "R", "M", "U", "R", "U", "M", "R" ]
A Frequency-based and a Poisson-based Definition of the Probability of Being Informative Thomas Roelleke Department of Computer Science Queen Mary University of London thor@dcs.qmul.ac.uk ABSTRACT This paper reports on theoretical investigations about the assumptions underlying the inverse document frequency (idf ). We...
A Frequency-based and a Poisson-based Definition of the Probability of Being Informative ABSTRACT This paper reports on theoretical investigations about the assumptions underlying the inverse document frequency (idf). We show that an intuitive idf - based probability function for the probability of a term being informa...
A Frequency-based and a Poisson-based Definition of the Probability of Being Informative ABSTRACT This paper reports on theoretical investigations about the assumptions underlying the inverse document frequency (idf). We show that an intuitive idf - based probability function for the probability of a term being informa...
A Frequency-based and a Poisson-based Definition of the Probability of Being Informative ABSTRACT This paper reports on theoretical investigations about the assumptions underlying the inverse document frequency (idf). We show that an intuitive idf - based probability function for the probability of a term being informa...
J-59
Cost Sharing in a Job Scheduling Problem Using the Shapley Value
A set of jobs need to be served by a single server which can serve only one job at a time. Jobs have processing times and incur waiting costs (linear in their waiting time). The jobs share their costs through compensation using monetary transfers. We characterize the Shapley value rule for this model using fairness axi...
[ "cost share", "cost share", "job schedul", "job schedul", "process time", "monetari transfer", "fair axiom", "shaplei valu", "queue problem", "agent", "cooper game theori approach", "unit wait cost", "alloc rule", "expect cost bound" ]
[ "P", "P", "P", "P", "P", "P", "P", "M", "M", "U", "U", "M", "M", "M" ]
Cost Sharing in a Job Scheduling Problem Using the Shapley Value Debasis Mishra Center for Operations Research and Econometrics (CORE) Universit´e Catholique de Louvain Louvain la Neuve, Belgium mishra@core.ucl.ac.be Bharath Rangarajan Center for Operations Research and Econometrics (CORE) Universit´e Catholique de Lou...
Cost Sharing in a Job Scheduling Problem Using the Shapley Value ABSTRACT A set of jobs need to be served by a single server which can serve only one job at a time. Jobs have processing times and incur waiting costs (linear in their waiting time). The jobs share their costs through compensation using monetary transfers...
Cost Sharing in a Job Scheduling Problem Using the Shapley Value ABSTRACT A set of jobs need to be served by a single server which can serve only one job at a time. Jobs have processing times and incur waiting costs (linear in their waiting time). The jobs share their costs through compensation using monetary transfers...
Cost Sharing in a Job Scheduling Problem Using the Shapley Value ABSTRACT A set of jobs need to be served by a single server which can serve only one job at a time. Jobs have processing times and incur waiting costs (linear in their waiting time). The jobs share their costs through compensation using monetary transfers...
C-69
pTHINC: A Thin-Client Architecture for Mobile Wireless Web
Although web applications are gaining popularity on mobile wireless PDAs, web browsers on these systems can be quite slow and often lack adequate functionality to access many web sites. We have developed pTHINC, a PDA thinclient solution that leverages more powerful servers to run full-function web browsers and other a...
[ "pthinc", "thin-client", "mobil", "web applic", "mobil wireless pda", "web browser", "function", "pda thinclient solut", "seamless mobil", "system usabl", "screen resolut", "local pda web browser", "web brows perform", "crucial browser helper applic", "video playback", "full-function w...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "M", "M", "U", "M" ]
pTHINC: A Thin-Client Architecture for Mobile Wireless Web Joeng Kim, Ricardo A. Baratto, and Jason Nieh Department of Computer Science Columbia University, New York, NY, USA {jk2438, ricardo, nieh}@cs. columbia.edu ABSTRACT Although web applications are gaining popularity on mobile wireless PDAs, web browsers on these...
pTHINC: A Thin-Client Architecture for Mobile Wireless Web ABSTRACT Although web applications are gaining popularity on mobile wireless PDAs, web browsers on these systems can be quite slow and often lack adequate functionality to access many web sites. We have developed pTHINC, a PDA thinclient solution that leverages...
pTHINC: A Thin-Client Architecture for Mobile Wireless Web ABSTRACT Although web applications are gaining popularity on mobile wireless PDAs, web browsers on these systems can be quite slow and often lack adequate functionality to access many web sites. We have developed pTHINC, a PDA thinclient solution that leverages...
pTHINC: A Thin-Client Architecture for Mobile Wireless Web ABSTRACT Although web applications are gaining popularity on mobile wireless PDAs, web browsers on these systems can be quite slow and often lack adequate functionality to access many web sites. We have developed pTHINC, a PDA thinclient solution that leverages...
J-65
Privacy in Electronic Commerce and the Economics of Immediate Gratification
Dichotomies between privacy attitudes and behavior have been noted in the literature but not yet fully explained. We apply lessons from the research on behavioral economics to understand the individual decision making process with respect to privacy in electronic commerce. We show that it is unrealistic to expect indiv...
[ "privaci", "electron commerc", "immedi gratif", "individu decis make process", "ration", "self-control problem", "psycholog distort", "anonym", "person inform protect", "psycholog inconsist", "time-inconsist prefer", "financi privaci", "privaci sensit decis", "privaci enhanc technolog", ...
[ "P", "P", "P", "P", "P", "P", "P", "U", "M", "M", "U", "M", "M", "M", "U" ]
Privacy in Electronic Commerce and the Economics of Immediate Gratification Alessandro Acquisti H. John Heinz III School of Public Policy and Management Carnegie Mellon University acquisti@andrew.cmu.edu ABSTRACT Dichotomies between privacy attitudes and behavior have been noted in the literature but not yet fully expl...
Privacy in Electronic Commerce and the Economics of Immediate Gratification ABSTRACT Dichotomies between privacy attitudes and behavior have been noted in the literature but not yet fully explained. We apply lessons from the research on behavioral economics to understand the individual decision making process with resp...
Privacy in Electronic Commerce and the Economics of Immediate Gratification ABSTRACT Dichotomies between privacy attitudes and behavior have been noted in the literature but not yet fully explained. We apply lessons from the research on behavioral economics to understand the individual decision making process with resp...
Privacy in Electronic Commerce and the Economics of Immediate Gratification ABSTRACT Dichotomies between privacy attitudes and behavior have been noted in the literature but not yet fully explained. We apply lessons from the research on behavioral economics to understand the individual decision making process with resp...
C-41
Evaluating Adaptive Resource Management for Distributed Real-Time Embedded Systems
A challenging problem faced by researchers and developers of distributed real-time and embedded (DRE) systems is devising and implementing effective adaptive resource management strategies that can meet end-to-end quality of service (QoS) requirements in varying operational conditions. This paper presents two contribut...
[ "adapt resourc manag", "hybrid adapt resourcemanag middlewar", "hybrid control techniqu", "distribut real-time embed system", "servic end-to-end qualiti", "real-time video distribut system", "real-time corba specif", "video encod/decod", "resourc reserv mechan", "dynam environ", "stream servic",...
[ "P", "P", "P", "M", "R", "M", "U", "M", "M", "U", "M", "M", "R", "R" ]
Evaluating Adaptive Resource Management for Distributed Real-Time Embedded Systems Nishanth Shankaran, ∗ Xenofon Koutsoukos, Douglas C. Schmidt, and Aniruddha Gokhale Dept. of EECS, Vanderbilt University, Nashville ABSTRACT A challenging problem faced by researchers and developers of distributed real-time and embedded ...
Evaluating Adaptive Resource Management for Distributed Real-Time Embedded Systems ABSTRACT A challenging problem faced by researchers and developers of distributed real-time and embedded (DRE) systems is devising and implementing effective adaptive resource management strategies that can meet end-to-end quality of ser...
Evaluating Adaptive Resource Management for Distributed Real-Time Embedded Systems ABSTRACT A challenging problem faced by researchers and developers of distributed real-time and embedded (DRE) systems is devising and implementing effective adaptive resource management strategies that can meet end-to-end quality of ser...
Evaluating Adaptive Resource Management for Distributed Real-Time Embedded Systems ABSTRACT A challenging problem faced by researchers and developers of distributed real-time and embedded (DRE) systems is devising and implementing effective adaptive resource management strategies that can meet end-to-end quality of ser...
C-55
Context Awareness for Group Interaction Support
In this paper, we present an implemented system for supporting group interaction in mobile distributed computing environments. First, an introduction to context computing and a motivation for using contextual information to facilitate group interaction is given. We then present the architecture of our system, which con...
[ "context awar", "group interact", "locat sens", "softwar framework", "contextawar", "mobil system", "fifth contextdimens group-context", "xml configur file", "event-condit-action", "sensor fusion" ]
[ "P", "P", "P", "U", "U", "R", "U", "U", "U", "U" ]
Context Awareness for Group Interaction Support Alois Ferscha, Clemens Holzmann, Stefan Oppl Institut für Pervasive Computing, Johannes Kepler Universität Linz Altenbergerstraße 69, A-4040 Linz {ferscha,holzmann,oppl}@soft. uni-linz. ac.at ABSTRACT In this paper, we present an implemented system for supporting group in...
Context Awareness for Group Interaction Support ABSTRACT In this paper, we present an implemented system for supporting group interaction in mobile distributed computing environments. First, an introduction to context computing and a motivation for using contextual information to facilitate group interaction is given. ...
Context Awareness for Group Interaction Support ABSTRACT In this paper, we present an implemented system for supporting group interaction in mobile distributed computing environments. First, an introduction to context computing and a motivation for using contextual information to facilitate group interaction is given. ...
Context Awareness for Group Interaction Support ABSTRACT In this paper, we present an implemented system for supporting group interaction in mobile distributed computing environments. First, an introduction to context computing and a motivation for using contextual information to facilitate group interaction is given. ...
J-71
A Dynamic Pari-Mutuel Market for Hedging, Wagering, and Information Aggregation
I develop a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). A DPM acts as hybrid between a pari-mutuel market and a continuous double auction (CDA), inheriting some of the advantages of both. Like a pari-mutuel market, a DPM offers infinite buy-in liquidity and z...
[ "dynam pari-mutuel market", "pari-mutuel market", "hedg", "wager", "inform aggreg", "risk alloc", "inform specul", "specul", "dpm", "hybrid", "continu doubl auction", "cda", "zero risk", "market institut", "price", "gain", "loss", "sell", "event resolut", "trader interfac", "...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "M", "U", "U", "U", "U" ]
A Dynamic Pari-Mutuel Market for Hedging, Wagering, and Information Aggregation David M. Pennock Yahoo! Research Labs 74 N. Pasadena Ave, 3rd Floor Pasadena, CA 91103 USA pennockd@yahoo-inc.com ABSTRACT I develop a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). ...
A Dynamic Pari-Mutuel Market for Hedging, Wagering, and Information Aggregation ABSTRACT I develop a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). A DPM acts as hybrid between a pari-mutuel market and a continuous double auction (CDA), inheriting some of the ad...
A Dynamic Pari-Mutuel Market for Hedging, Wagering, and Information Aggregation ABSTRACT I develop a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). A DPM acts as hybrid between a pari-mutuel market and a continuous double auction (CDA), inheriting some of the ad...
A Dynamic Pari-Mutuel Market for Hedging, Wagering, and Information Aggregation ABSTRACT I develop a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). A DPM acts as hybrid between a pari-mutuel market and a continuous double auction (CDA), inheriting some of the ad...
C-83
Concept and Architecture of a Pervasive Document Editing and Managing System
Collaborative document processing has been addressed by many approaches so far, most of which focus on document versioning and collaborative editing. We address this issue from a different angle and describe the concept and architecture of a pervasive document editing and managing system. It exploits database technique...
[ "pervas document edit and manag system", "pervas document edit and manag system", "collabor document process", "collabor document", "text edit", "real-time transact", "comput support collabor work", "busi logic layer", "real-time server compon", "collabor layout", "hierarch file system", "rest...
[ "P", "P", "P", "P", "M", "U", "M", "U", "U", "M", "M", "U", "U", "U", "U" ]
Concept and Architecture of a Pervasive Document Editing and Managing System Stefania Leone Thomas B. Hodel Harald Gall University of Zurich, Switzerland University of Zurich, Switzerland University of Zurich, Switzerland Department of Informatics Department of Informatics Department of Informatics leone@ifi.unizh.ch h...
Concept and Architecture of a Pervasive Document Editing and Managing System ABSTRACT Collaborative document processing has been addressed by many approaches so far, most of which focus on document versioning and collaborative editing. We address this issue from a different angle and describe the concept and architectu...
Concept and Architecture of a Pervasive Document Editing and Managing System ABSTRACT Collaborative document processing has been addressed by many approaches so far, most of which focus on document versioning and collaborative editing. We address this issue from a different angle and describe the concept and architectu...
Concept and Architecture of a Pervasive Document Editing and Managing System ABSTRACT Collaborative document processing has been addressed by many approaches so far, most of which focus on document versioning and collaborative editing. We address this issue from a different angle and describe the concept and architectu...
C-54
Remote Access to Large Spatial Databases
Enterprises in the public and private sectors have been making their large spatial data archives available over the Internet. However, interactive work with such large volumes of online spatial data is a challenging task. We propose two efficient approaches to remote access to large spatial data. First, we introduce a ...
[ "remot access", "larg spatial data", "internet", "spatial queri evalu", "data visual", "data manag", "network latenc", "client-server architectur", "central peer-to-peer approach", "sand", "dynam network infrastructur", "web browser", "internet-enabl databas manag system", "gi", "client-...
[ "P", "P", "P", "P", "P", "P", "P", "M", "M", "U", "M", "U", "M", "U", "U", "U" ]
Remote Access to Large Spatial Databases ∗ Egemen Tanin Frantiˇsek Brabec Hanan Samet Computer Science Department Center for Automation Research Institute for Advanced Computer Studies University of Maryland, College Park, MD 20742 {egemen,brabec,hjs}@umiacs. umd.edu www.cs.umd.edu/{~egemen,~brabec,~hjs} ABSTRACT Enter...
Remote Access to Large Spatial Databases * ABSTRACT Enterprises in the public and private sectors have been making their large spatial data archives available over the Internet. However, interactive work with such large volumes of online spatial data is a challenging task. We propose two efficient approaches to remote ...
Remote Access to Large Spatial Databases * ABSTRACT Enterprises in the public and private sectors have been making their large spatial data archives available over the Internet. However, interactive work with such large volumes of online spatial data is a challenging task. We propose two efficient approaches to remote ...
Remote Access to Large Spatial Databases * ABSTRACT Enterprises in the public and private sectors have been making their large spatial data archives available over the Internet. However, interactive work with such large volumes of online spatial data is a challenging task. We propose two efficient approaches to remote ...
J-70
Self-interested Automated Mechanism Design and Implications for Optimal Combinatorial Auctions
Often, an outcome must be chosen on the basis of the preferences reported by a group of agents. The key difficulty is that the agents may report their preferences insincerely to make the chosen outcome more favorable to themselves. Mechanism design is the art of designing the rules of the game so that the agents are mo...
[ "autom mechan design", "autom mechan design", "mechan design", "combinatori auction", "desir outcom", "prefer aggreg", "manipul", "individu ration", "nonmanipul mechan", "statist knowledg", "classic mechan", "payment maxim", "fallback outcom", "minsat", "self-interest amd", "complement...
[ "P", "P", "P", "P", "P", "P", "U", "U", "M", "U", "M", "M", "M", "U", "R", "U", "U" ]
Self-interested Automated Mechanism Design and Implications for Optimal Combinatorial Auctions∗ Vincent Conitzer Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA conitzer@cs.cmu.edu Tuomas Sandholm Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA sandholm@cs.cmu.edu ABSTRAC...
Self-interested Automated Mechanism Design and Implications for Optimal Combinatorial Auctions ∗ ABSTRACT Often, an outcome must be chosen on the basis of the preferences reported by a group of agents. The key difficulty is that the agents may report their preferences insincerely to make the chosen outcome more favorab...
Self-interested Automated Mechanism Design and Implications for Optimal Combinatorial Auctions ∗ ABSTRACT Often, an outcome must be chosen on the basis of the preferences reported by a group of agents. The key difficulty is that the agents may report their preferences insincerely to make the chosen outcome more favorab...
Self-interested Automated Mechanism Design and Implications for Optimal Combinatorial Auctions ∗ ABSTRACT Often, an outcome must be chosen on the basis of the preferences reported by a group of agents. The key difficulty is that the agents may report their preferences insincerely to make the chosen outcome more favorab...
C-68
An Evaluation of Availability Latency in Carrier-based Vehicular ad-hoc Networks
On-demand delivery of audio and video clips in peer-to-peer vehicular ad-hoc networks is an emerging area of research. Our target environment uses data carriers, termed zebroids, where a mobile device carries a data item on behalf of a server to a client thereby minimizing its availability latency. In this study, we qu...
[ "avail latenc", "latenc", "audio and video clip", "data carrier", "term zebroid", "zebroid", "mobil devic", "mobil", "car densiti", "storag per devic", "repositori size", "replac polici", "naiv random replac polici", "peer-to-peer vehicular ad-hoc network", "zebroid simplifi instanti", ...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "R", "R", "U", "U" ]
An Evaluation of Availability Latency in Carrier-based Vehicular ad-hoc Networks Shahram Ghandeharizadeh Dept of Computer Science Univ of Southern California Los Angeles, CA 90089, USA shahram@usc.edu Shyam Kapadia Dept of Computer Science Univ of Southern California Los Angeles, CA 90089, USA kapadia@usc.edu Bhaskar K...
An Evaluation of Availability Latency in Carrier-based Vehicular Ad-Hoc Networks Shahram ABSTRACT On-demand delivery of audio and video clips in peer-to-peer vehicular ad-hoc networks is an emerging area of research. Our target environment uses data carriers, termed zebroids, where a mobile device carries a data item o...
An Evaluation of Availability Latency in Carrier-based Vehicular Ad-Hoc Networks Shahram ABSTRACT On-demand delivery of audio and video clips in peer-to-peer vehicular ad-hoc networks is an emerging area of research. Our target environment uses data carriers, termed zebroids, where a mobile device carries a data item o...
An Evaluation of Availability Latency in Carrier-based Vehicular Ad-Hoc Networks Shahram ABSTRACT On-demand delivery of audio and video clips in peer-to-peer vehicular ad-hoc networks is an emerging area of research. Our target environment uses data carriers, termed zebroids, where a mobile device carries a data item o...
J-58
Towards Truthful Mechanisms for Binary Demand Games: A General Framework
The family of Vickrey-Clarke-Groves (VCG) mechanisms is arguably the most celebrated achievement in truthful mechanism design. However, VCG mechanisms have their limitations. They only apply to optimization problems with a utilitarian (or affine) objective function, and their output should optimize the objective functi...
[ "truth mechan", "binari demand game", "demand game", "mechan design", "object function", "monoton properti", "combin", "vickrei-clark-grove", "composit-base techniqu", "selfish wireless network", "price", "cut valu function", "selfish agent" ]
[ "P", "P", "P", "P", "P", "P", "P", "U", "M", "U", "U", "M", "M" ]
Towards Truthful Mechanisms for Binary Demand Games: A General Framework Ming-Yang Kao ∗ Dept. of Computer Science Northwestern University Evanston, IL, USA kao@cs.northwestern.edu Xiang-Yang Li † Dept. of Computer Science Illinois Institute of Technology Chicago, IL, USA xli@cs.iit.edu WeiZhao Wang Dept. of Computer S...
Towards Truthful Mechanisms for Binary Demand Games: A General Framework ABSTRACT The family of Vickrey-Clarke-Groves (VCG) mechanisms is arguably the most celebrated achievement in truthful mechanism design. However, VCG mechanisms have their limitations. They only apply to optimization problems with a utilitarian (or...
Towards Truthful Mechanisms for Binary Demand Games: A General Framework ABSTRACT The family of Vickrey-Clarke-Groves (VCG) mechanisms is arguably the most celebrated achievement in truthful mechanism design. However, VCG mechanisms have their limitations. They only apply to optimization problems with a utilitarian (or...
Towards Truthful Mechanisms for Binary Demand Games: A General Framework ABSTRACT The family of Vickrey-Clarke-Groves (VCG) mechanisms is arguably the most celebrated achievement in truthful mechanism design. However, VCG mechanisms have their limitations. They only apply to optimization problems with a utilitarian (or...
H-61
Impedance Coupling in Content-targeted Advertising
The current boom of the Web is associated with the revenues originated from on-line advertising. While search-based advertising is dominant, the association of ads with a Web page (during user navigation) is becoming increasingly important. In this work, we study the problem of associating ads with a Web page, referred...
[ "content-target advertis", "advertis", "web", "match strategi", "ad and keyword", "imped coupl strategi", "on-line advertis", "paid placement strategi", "keyword target advertis", "bayesian network model", "expans term", "ad placement strategi", "bayesian network", "knn" ]
[ "P", "P", "P", "P", "P", "P", "M", "M", "M", "U", "U", "M", "U", "U" ]
Impedance Coupling in Content-targeted Advertising Berthier Ribeiro-Neto Computer Science Department Federal University of Minas Gerais Belo Horizonte, Brazil berthier@dcc.ufmg.br Marco Cristo Computer Science Department Federal University of Minas Gerais Belo Horizonte, Brazil marco@dcc.ufmg.br Paulo B. Golgher Akwan ...
Impedance Coupling in Content-targeted Advertising ABSTRACT The current boom of the Web is associated with the revenues originated from on-line advertising. While search-based advertising is dominant, the association of ads with a Web page (during user navigation) is becoming increasingly important. In this work, we st...
Impedance Coupling in Content-targeted Advertising ABSTRACT The current boom of the Web is associated with the revenues originated from on-line advertising. While search-based advertising is dominant, the association of ads with a Web page (during user navigation) is becoming increasingly important. In this work, we st...
Impedance Coupling in Content-targeted Advertising ABSTRACT The current boom of the Web is associated with the revenues originated from on-line advertising. While search-based advertising is dominant, the association of ads with a Web page (during user navigation) is becoming increasingly important. In this work, we st...
H-49
Performance Prediction Using Spatial Autocorrelation
Evaluation of information retrieval systems is one of the core tasks in information retrieval. Problems include the inability to exhaustively label all documents for a topic, nongeneralizability from a small number of topics, and incorporating the variability of retrieval systems. Previous work addresses the evaluation...
[ "perform predict", "spatial autocorrel", "autocorrel", "inform retriev", "cluster hypothesi", "zero relev judgment", "predictor relationship", "predictor predict power", "languag model score", "queri rank", "regular" ]
[ "P", "P", "P", "P", "U", "M", "M", "M", "M", "R", "U" ]
Performance Prediction Using Spatial Autocorrelation Fernando Diaz Center for Intelligent Information Retrieval Department of Computer Science University of Massachusetts Amherst, MA 01003 fdiaz@cs.umass.edu ABSTRACT Evaluation of information retrieval systems is one of the core tasks in information retrieval. Problems...
Performance Prediction Using Spatial Autocorrelation ABSTRACT Evaluation of information retrieval systems is one of the core tasks in information retrieval. Problems include the inability to exhaustively label all documents for a topic, nongeneralizability from a small number of topics, and incorporating the variabilit...
Performance Prediction Using Spatial Autocorrelation ABSTRACT Evaluation of information retrieval systems is one of the core tasks in information retrieval. Problems include the inability to exhaustively label all documents for a topic, nongeneralizability from a small number of topics, and incorporating the variabilit...
Performance Prediction Using Spatial Autocorrelation ABSTRACT Evaluation of information retrieval systems is one of the core tasks in information retrieval. Problems include the inability to exhaustively label all documents for a topic, nongeneralizability from a small number of topics, and incorporating the variabilit...
C-44
MSP: Multi-Sequence Positioning of Wireless Sensor Nodes
Wireless Sensor Networks have been proposed for use in many location-dependent applications. Most of these need to identify the locations of wireless sensor nodes, a challenging task because of the severe constraints on cost, energy and effective range of sensor devices. To overcome limitations in existing solutions, w...
[ "wireless sensor network", "node local", "local", "event distribut", "multi-sequenc posit", "massiv uva-base deploment", "spatiotempor correl", "rang-base approach", "distribut-base locat estim", "listen-detect-assembl-report protocol", "margin distribut", "node sequenc process" ]
[ "P", "P", "P", "P", "M", "U", "U", "U", "M", "U", "M", "R" ]
MSP: Multi-Sequence Positioning of Wireless Sensor Nodes∗ Ziguo Zhong Computer Science and Engineering University of Minnesota zhong@cs.umn.edu Tian He Computer Science and Engineering University of Minnesota tianhe@cs.umn.edu Abstract Wireless Sensor Networks have been proposed for use in many location-dependent appli...
MSP: Multi-Sequence Positioning of Wireless Sensor Nodes * Abstract Wireless Sensor Networks have been proposed for use in many location-dependent applications. Most of these need to identify the locations of wireless sensor nodes, a challenging task because of the severe constraints on cost, energy and effective range...
MSP: Multi-Sequence Positioning of Wireless Sensor Nodes * Abstract Wireless Sensor Networks have been proposed for use in many location-dependent applications. Most of these need to identify the locations of wireless sensor nodes, a challenging task because of the severe constraints on cost, energy and effective range...
MSP: Multi-Sequence Positioning of Wireless Sensor Nodes * Abstract Wireless Sensor Networks have been proposed for use in many location-dependent applications. Most of these need to identify the locations of wireless sensor nodes, a challenging task because of the severe constraints on cost, energy and effective range...
J-60
On Decentralized Incentive Compatible Mechanisms for Partially Informed Environments
Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally efficient mechanisms for severely restricted players (single-parameter domains). As it turns out, many natural social goals cannot be impleme...
[ "decentr incent compat mechan", "partial inform environ", "domin strategi implement", "distribut environ", "comput entiti", "cooper", "agent", "distribut algorithm mechan design", "vickrei-clark-grove", "weakli domin strategi iter elimin", "peer-to-peer", "p-inform environ" ]
[ "P", "P", "P", "P", "P", "P", "P", "R", "U", "R", "U", "M" ]
On Decentralized Incentive Compatible Mechanisms for Partially Informed Environments ∗ Ahuva Mu``alem School of Engineering and Computer Science The Hebrew University of Jerusalem ahumu@cs.huji.ac.il ABSTRACT Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the ce...
On Decentralized Incentive Compatible Mechanisms for Partially Informed Environments * ABSTRACT Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally efficient mechanisms for severely restricted ...
On Decentralized Incentive Compatible Mechanisms for Partially Informed Environments * ABSTRACT Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally efficient mechanisms for severely restricted ...
On Decentralized Incentive Compatible Mechanisms for Partially Informed Environments * ABSTRACT Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally efficient mechanisms for severely restricted ...
J-74
On Cheating in Sealed-Bid Auctions
Motivated by the rise of online auctions and their relative lack of security, this paper analyzes two forms of cheating in sealed-bid auctions. The first type of cheating we consider occurs when the seller spies on the bids of a second-price auction and then inserts a fake bid in order to increase the payment of the wi...
[ "cheat", "cheat", "auction", "seller", "payment", "case", "possibl", "seal-bid", "bidsecond-price auction", "agent", "first-price auction", "game theori", "seal-bid auction" ]
[ "P", "P", "P", "P", "P", "P", "P", "U", "M", "U", "M", "U", "M" ]
On Cheating in Sealed-Bid Auctions Ryan Porter rwporter@stanford.edu Yoav Shoham shoham@stanford.edu Computer Science Department Stanford University Stanford, CA 94305 ABSTRACT Motivated by the rise of online auctions and their relative lack of security, this paper analyzes two forms of cheating in sealed-bid auctions....
On Cheating in Sealed-Bid Auctions Motivated by the rise of online auctions and their relative lack of security, this paper analyzes two forms of cheating in sealed-bid auctions. The first type of cheating we consider occurs when the seller spies on the bids of a second-price auction and then inserts a fake bid in orde...
On Cheating in Sealed-Bid Auctions Motivated by the rise of online auctions and their relative lack of security, this paper analyzes two forms of cheating in sealed-bid auctions. The first type of cheating we consider occurs when the seller spies on the bids of a second-price auction and then inserts a fake bid in orde...
On Cheating in Sealed-Bid Auctions Motivated by the rise of online auctions and their relative lack of security, this paper analyzes two forms of cheating in sealed-bid auctions. The first type of cheating we consider occurs when the seller spies on the bids of a second-price auction and then inserts a fake bid in orde...
C-50
CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses
This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based sensors, and a small number of storage and processing devices. It is designed for search and rescue of people in emergency situations in wilderness areas. ...
[ "wit", "search and rescu", "emerg situat", "sensor network", "connect network", "intermitt network connect", "pervas comput", "satellit transmitt", "group and partit", "locat track system", "hiker", "gp receiv", "rf transmitt", "beacon" ]
[ "P", "P", "P", "P", "P", "P", "U", "U", "M", "M", "U", "U", "U", "U" ]
CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses Jyh-How Huang Department of Computer Science University of Colorado, Campus Box 0430 Boulder, CO 80309-0430 huangjh@cs.colorado.edu Saqib Amjad Department of Computer Science University of Colorado, Campus Box 0430 Boulder, CO 80309-0430 S...
CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses University of Colorado, Campus Box 0430 Boulder, CO 80309-0430 ABSTRACT This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based se...
CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses University of Colorado, Campus Box 0430 Boulder, CO 80309-0430 ABSTRACT This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based se...
CenWits: A Sensor-Based Loosely Coupled Search and Rescue System Using Witnesses University of Colorado, Campus Box 0430 Boulder, CO 80309-0430 ABSTRACT This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based se...
C-78
An Architectural Framework and a Middleware for Cooperating Smart Components
In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously act in response to it. Examples range in telematics, traffic management, team robotics or home automation to name a few. To a large extent, such systems operate proactively and...
[ "smart sensor", "sensor and actuat", "gener event architectur", "tempor constraint", "event channel", "event channel", "event-base system", "corba", "real-time entiti", "sentient object", "dissemin qualiti", "cortex", "gear architectur", "tempor valid", "soft real-time channel", "cosmi...
[ "P", "P", "P", "P", "P", "P", "M", "U", "U", "U", "R", "U", "R", "M", "M", "M", "M", "M", "M", "R" ]
An Architectural Framework and a Middleware for Cooperating Smart Components ∗ Ant´onio Casimiro U.Lisboa casim@di.fc.ul.pt J¨org Kaiser U.Ulm kaiser@informatik.uniulm.de Paulo Ver´ıssimo U.Lisboa pjv@di.fc.ul.pt ABSTRACT In a future networked physical world, a myriad of smart sensors and actuators assess and control a...
An Architectural Framework and a Middleware for Cooperating Smart Components * U.Lisboa U.Ulm U.Lisboa casim@di.fc.ul.pt kaiser@informatik.uni- pjv@di.fc.ul.pt ulm.de ABSTRACT In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously ...
An Architectural Framework and a Middleware for Cooperating Smart Components * U.Lisboa U.Ulm U.Lisboa casim@di.fc.ul.pt kaiser@informatik.uni- pjv@di.fc.ul.pt ulm.de ABSTRACT In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously ...
An Architectural Framework and a Middleware for Cooperating Smart Components * U.Lisboa U.Ulm U.Lisboa casim@di.fc.ul.pt kaiser@informatik.uni- pjv@di.fc.ul.pt ulm.de ABSTRACT In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously ...
J-49
Information Markets vs. Opinion Pools: An Empirical Comparison
In this paper, we examine the relative forecast accuracy of information markets versus expert aggregation. We leverage a unique data source of almost 2000 people's subjective probability judgments on 2003 US National Football League games and compare with the market probabilities given by two different information mark...
[ "inform market", "opinion pool", "forecast", "expert aggreg", "market probabl", "pool predict", "price", "futur event", "expertis", "contract", "expert opinion", "predict accuraci" ]
[ "P", "P", "P", "P", "P", "P", "P", "M", "U", "U", "R", "R" ]
Information Markets vs. Opinion Pools: An Empirical Comparison Yiling Chen Chao-Hsien Chu Tracy Mullen School of Information Sciences & Technology The Pennsylvania State University University Park, PA 16802 {ychen|chu|tmullen}@ist. psu.edu David M. Pennock Yahoo! Research Labs 74 N. Pasadena Ave, 3rd Floor Pasadena, CA...
Information Markets vs. Opinion Pools: An Empirical Comparison ABSTRACT In this paper, we examine the relative forecast accuracy of information markets versus expert aggregation. We leverage a unique data source of almost 2000 people's subjective probability judgments on 2003 US National Football League games and compa...
Information Markets vs. Opinion Pools: An Empirical Comparison ABSTRACT In this paper, we examine the relative forecast accuracy of information markets versus expert aggregation. We leverage a unique data source of almost 2000 people's subjective probability judgments on 2003 US National Football League games and compa...
Information Markets vs. Opinion Pools: An Empirical Comparison ABSTRACT In this paper, we examine the relative forecast accuracy of information markets versus expert aggregation. We leverage a unique data source of almost 2000 people's subjective probability judgments on 2003 US National Football League games and compa...
C-79
A Cross-Layer Approach to Resource Discovery and Distribution in Mobile ad-hoc Networks
This paper describes a cross-layer approach to designing robust P2P system over mobile ad-hoc networks. The design is based on simple functional primitives that allow routing at both P2P and network layers to be integrated to reduce overhead. With these primitives, the paper addresses various load balancing techniques....
[ "resourc discoveri", "mobil ad-hoc network", "manet", "manet p2p system", "hybrid discoveri scheme", "neighbor discoveri protocol", "neg feedback", "queri packet", "replica invalid", "valid mesh", "invalid packet", "manet rout protocol", "rout discoveri messag", "concurr updat" ]
[ "P", "P", "U", "M", "M", "M", "U", "U", "U", "U", "U", "M", "M", "U" ]
A Cross-Layer Approach to Resource Discovery and Distribution in Mobile ad-hoc Networks Chaiporn Jaikaeo Computer Engineering Kasetsart University, Thailand (+662) 942-8555 Ext 1424 cpj@cpe.ku.ac.th Xiang Cao Computer and Information Sciences University of Delaware, USA (+1) 302-831-1131 cao@cis.udel.edu Chien-Chung Sh...
A Cross-Layer Approach to Resource Discovery and Distribution in Mobile Ad hoc Networks ABSTRACT This paper describes a cross-layer approach to designing robust P2P system over mobile ad hoc networks. The design is based on simple functional primitives that allow routing at both P2P and network layers to be integrated ...
A Cross-Layer Approach to Resource Discovery and Distribution in Mobile Ad hoc Networks ABSTRACT This paper describes a cross-layer approach to designing robust P2P system over mobile ad hoc networks. The design is based on simple functional primitives that allow routing at both P2P and network layers to be integrated ...
A Cross-Layer Approach to Resource Discovery and Distribution in Mobile Ad hoc Networks ABSTRACT This paper describes a cross-layer approach to designing robust P2P system over mobile ad hoc networks. The design is based on simple functional primitives that allow routing at both P2P and network layers to be integrated ...
C-45
StarDust: A Flexible Architecture for Passive Localization in Wireless Sensor Networks
The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, energy expenditure and the duration of the localization phase. In this paper we propose a framework, called StarDust, for wireless sensor netwo...
[ "local", "wireless sensor network", "rang", "sensor node", "imag process", "perform", "corner-cube retro-reflector", "aerial vehicl", "scene label", "consist", "probabl", "uniqu map", "connect" ]
[ "P", "P", "P", "P", "P", "P", "M", "M", "M", "U", "U", "U", "U" ]
StarDust: A Flexible Architecture for Passive Localization in Wireless Sensor Networks ∗ Radu Stoleru, Pascal Vicaire, Tian He†, John A. Stankovic Department of Computer Science, University of Virginia †Department of Computer Science and Engineering, University of Minnesota {stoleru, pv9f}@cs. virginia.edu, tianhe@cs.u...
StarDust: A Flexible Architecture for Passive Localization in Wireless Sensor Networks * Abstract The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, energy expenditure and the duration of the lo...
StarDust: A Flexible Architecture for Passive Localization in Wireless Sensor Networks * Abstract The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, energy expenditure and the duration of the lo...
StarDust: A Flexible Architecture for Passive Localization in Wireless Sensor Networks * Abstract The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, energy expenditure and the duration of the lo...
J-61
ICE: An Iterative Combinatorial Exchange
We present the first design for an iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive for CEs. Bidders specify lower and upper bounds on their value for different trades. These bounds allow price discovery and useful preference elicitation in e...
[ "iter combinatori exchang", "combinatori exchang", "bid", "trade", "price", "prefer elicit", "doubl auction", "combinatori auction", "buyer and seller", "tree-base bid languag", "winner-determin", "threshold payment", "vcg" ]
[ "P", "P", "P", "P", "P", "P", "U", "M", "M", "M", "U", "M", "U" ]
ICE: An Iterative Combinatorial Exchange David C. Parkes∗ † Ruggiero Cavallo† Nick Elprin† Adam Juda† S´ebastien Lahaie† Benjamin Lubin† Loizos Michael† Jeffrey Shneidman† Hassan Sultan† ABSTRACT We present the first design for an iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding la...
ICE: An Iterative Combinatorial Exchange David C. Parkes * s Ruggiero Cavallos Nick Elprins Adam Judas S ´ ebastien Lahaies ABSTRACT We present the first design for an iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive for CEs. Bidders specify ...
ICE: An Iterative Combinatorial Exchange David C. Parkes * s Ruggiero Cavallos Nick Elprins Adam Judas S ´ ebastien Lahaies ABSTRACT We present the first design for an iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive for CEs. Bidders specify ...
ICE: An Iterative Combinatorial Exchange David C. Parkes * s Ruggiero Cavallos Nick Elprins Adam Judas S ´ ebastien Lahaies ABSTRACT We present the first design for an iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive for CEs. Bidders specify ...
H-64
Machine Learning for Information Architecture in a Large Governmental Website
This paper describes ongoing research into the application of machine learning techniques for improving access to governmental information in complex digital libraries. Under the auspices of the GovStat Project, our goal is to identify a small number of semantically valid concepts that adequately spans the intellectual...
[ "machin learn", "inform architectur", "machin learn techniqu", "access", "complex digit librari", "digit librari", "data-driven approach", "supervis and unsupervis learn techniqu", "bureau of labor statist", "eigenvalu", "bl collect", "k-mean cluster", "multiwai classif", "interfac design"...
[ "P", "P", "P", "P", "P", "P", "U", "M", "M", "U", "M", "U", "U", "M" ]
Machine Learning for Information Architecture in a Large Governmental Website ∗ Miles Efron School of Information & Library Science CB#3360, 100 Manning Hall University of North Carolina Chapel Hill, NC 27599-3360 efrom@ils.unc.edu Jonathan Elsas School of Information & Library Science CB#3360, 100 Manning Hall Univers...
Machine Learning for Information Architecture in a Large Governmental Website * ABSTRACT This paper describes ongoing research into the application of machine learning techniques for improving access to governmental information in complex digital libraries. Under the auspices of the GovStat Project, our goal is to iden...
Machine Learning for Information Architecture in a Large Governmental Website * ABSTRACT This paper describes ongoing research into the application of machine learning techniques for improving access to governmental information in complex digital libraries. Under the auspices of the GovStat Project, our goal is to iden...
Machine Learning for Information Architecture in a Large Governmental Website * ABSTRACT This paper describes ongoing research into the application of machine learning techniques for improving access to governmental information in complex digital libraries. Under the auspices of the GovStat Project, our goal is to iden...
C-53
Globally Synchronized Dead-Reckoning with Local Lag for Continuous Distributed Multiplayer Games
Dead-Reckoning (DR) is an effective method to maintain consistency for Continuous Distributed Multiplayer Games (CDMG). Since DR can filter most unnecessary state updates and improve the scalability of a system, it is widely used in commercial CDMG. However, DR cannot maintain high consistency, and this constrains its ...
[ "dead-reckon", "local lag", "multiplay game", "consist", "gs-dr-ll", "network transmiss delai", "time warp", "accur state", "correct", "physic clock", "usabl and fair", "distribut multi-player game", "continu replic applic" ]
[ "P", "P", "P", "P", "P", "U", "U", "M", "U", "U", "M", "M", "M" ]
Globally Synchronized Dead-Reckoning with Local Lag for Continuous Distributed Multiplayer Games Yi Zhang1 , Ling Chen1, 2 , Gencai Chen1 1College of Computer Science, Zhejiang University, Hangzhou 310027, P.R. China 2School of Computer Science and IT, The University of Nottingham, Nottingham NG8 1BB, UK {m05zhangyi, l...
Globally Synchronized Dead-Reckoning with Local Lag for Continuous Distributed Multiplayer Games ABSTRACT Dead-Reckoning (DR) is an effective method to maintain consistency for Continuous Distributed Multiplayer Games (CDMG). Since DR can filter most unnecessary state updates and improve the scalability of a system, it...
Globally Synchronized Dead-Reckoning with Local Lag for Continuous Distributed Multiplayer Games ABSTRACT Dead-Reckoning (DR) is an effective method to maintain consistency for Continuous Distributed Multiplayer Games (CDMG). Since DR can filter most unnecessary state updates and improve the scalability of a system, it...
Globally Synchronized Dead-Reckoning with Local Lag for Continuous Distributed Multiplayer Games ABSTRACT Dead-Reckoning (DR) is an effective method to maintain consistency for Continuous Distributed Multiplayer Games (CDMG). Since DR can filter most unnecessary state updates and improve the scalability of a system, it...
J-63
Negotiation-Range Mechanisms: Exploring the Limits of Truthful Efficient Markets
This paper introduces a new class of mechanisms based on negotiation between market participants. This model allows us to circumvent Myerson and Satterthwaite's impossibility result and present a bilateral market mechanism that is efficient, individually rational, incentive compatible and budget balanced in the single-...
[ "effici market", "imposs result", "individu ration", "incent compat", "effici truth market", "negoti base mechan", "buyer and seller", "good exchang", "negotiationrang market", "negoti-rang mechan", "real-world market environ", "util", "possibl agreement zone", "mechan design" ]
[ "P", "P", "P", "P", "R", "R", "M", "U", "M", "M", "M", "U", "R", "M" ]
Negotiation-Range Mechanisms: Exploring the Limits of Truthful Efficient Markets Yair Bartal ∗ School of Computer Science and Engineering The Hebrew University of Jerusalem, Israel yair@cs.huji.ac.il Rica Gonen School of Computer Science and Engineering The Hebrew University of Jerusalem, Israel rgonen@cs.huji.ac.il Pi...
Negotiation-Range Mechanisms: Exploring the Limits of Truthful Efficient Markets ABSTRACT This paper introduces a new class of mechanisms based on negotiation between market participants. This model allows us to circumvent Myerson and Satterthwaite's impossibility result and present a bilateral market mechanism that is...
Negotiation-Range Mechanisms: Exploring the Limits of Truthful Efficient Markets ABSTRACT This paper introduces a new class of mechanisms based on negotiation between market participants. This model allows us to circumvent Myerson and Satterthwaite's impossibility result and present a bilateral market mechanism that is...
Negotiation-Range Mechanisms: Exploring the Limits of Truthful Efficient Markets ABSTRACT This paper introduces a new class of mechanisms based on negotiation between market participants. This model allows us to circumvent Myerson and Satterthwaite's impossibility result and present a bilateral market mechanism that is...
C-84
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis
We analyze replication of resources by server nodes that act selfishly, using a game-theoretic approach. We refer to this as the selfish caching problem. In our model, nodes incur either cost for replicating resources or cost for access to a remote replica. We show the existence of pure strategy Nash equilibria and inv...
[ "cach", "distribut system", "game-theoret approach", "cach problem", "remot replica", "network topolog", "nash equilibrium", "peer-to-peer file system", "demand distribut", "anarchi price", "instrument server", "primal-dual techniqu", "social util", "submodular", "group strategyproof", ...
[ "P", "P", "P", "P", "P", "P", "M", "M", "M", "R", "M", "U", "M", "U", "U", "U", "M", "R" ]
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis Byung-Gon Chun ∗ bgchun@cs.berkeley.edu Kamalika Chaudhuri † kamalika@cs.berkeley.edu Hoeteck Wee ‡ hoeteck@cs.berkeley.edu Marco Barreno § barreno@cs.berkeley.edu Christos H. Papadimitriou † christos@cs.berkeley.edu John Kubiatowicz ∗ kubitron@cs.berkel...
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis ABSTRACT We analyze replication of resources by server nodes that act selfishly, using a game-theoretic approach. We refer to this as the selfish caching problem. In our model, nodes incur either cost for replicating resources or cost for access to a rem...
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis ABSTRACT We analyze replication of resources by server nodes that act selfishly, using a game-theoretic approach. We refer to this as the selfish caching problem. In our model, nodes incur either cost for replicating resources or cost for access to a rem...
Selfish Caching in Distributed Systems: A Game-Theoretic Analysis ABSTRACT We analyze replication of resources by server nodes that act selfishly, using a game-theoretic approach. We refer to this as the selfish caching problem. In our model, nodes incur either cost for replicating resources or cost for access to a rem...
J-62
Weak Monotonicity Suffices for Truthfulness on Convex Domains
Weak monotonicity is a simple necessary condition for a social choice function to be implementable by a truthful mechanism. Roberts [10] showed that it is sufficient for all social choice functions whose domain is unrestricted. Lavi, Mu'alem and Nisan [6] proved the sufficiency of weak monotonicity for functions over o...
[ "weak monoton", "truth", "truth", "convex domain", "social choic function", "individu prefer", "truth implement", "recognit algorithm", "nonneg cycl properti", "affin maxim", "non-truth function", "domin strategi", "mechan design", "strategyproof" ]
[ "P", "P", "P", "P", "P", "U", "R", "U", "U", "U", "M", "U", "M", "U" ]
Weak Monotonicity Suffices for Truthfulness on Convex Domains Michael Saks ∗ Dept. of Mathematics Rutgers University 110 Frelinghuysen Road Piscataway, NJ, 08854 saks@math.rutgers.edu Lan Yu † Dept. of Computer Science Rutgers University 110 Frelinghuysen Road Piscataway, NJ, 08854 lanyu@paul.rutgers.edu ABSTRACT Weak ...
Weak Monotonicity Suffices for Truthfulness on Convex Domains ABSTRACT Weak monotonicity is a simple necessary condition for a social choice function to be implementable by a truthful mechanism. Roberts [10] showed that it is sufficient for all social choice functions whose domain is unrestricted. Lavi, Mu'alem and Nis...
Weak Monotonicity Suffices for Truthfulness on Convex Domains ABSTRACT Weak monotonicity is a simple necessary condition for a social choice function to be implementable by a truthful mechanism. Roberts [10] showed that it is sufficient for all social choice functions whose domain is unrestricted. Lavi, Mu'alem and Nis...
Weak Monotonicity Suffices for Truthfulness on Convex Domains ABSTRACT Weak monotonicity is a simple necessary condition for a social choice function to be implementable by a truthful mechanism. Roberts [10] showed that it is sufficient for all social choice functions whose domain is unrestricted. Lavi, Mu'alem and Nis...
C-46
TSAR: A Two Tier Sensor Storage Architecture Using Interval Skip Graphs
Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems are designed primarily for flat hierarchies of homogeneous sensor nodes and do not fully exploit the multi-tier nature of emerging sensor netw...
[ "interv skip graph", "archiv", "archiv storag", "sensor data", "distribut index structur", "data separ", "analysi", "flood", "geograph hash tabl", "homogen architectur", "multi-tier sensor network", "flash storag", "metada", "spatial scope", "interv tree", "wireless sensor network", ...
[ "P", "P", "P", "P", "P", "R", "U", "U", "U", "R", "M", "M", "U", "U", "M", "M", "M" ]
TSAR: A Two Tier Sensor Storage Architecture Using Interval Skip Graphs ∗ Peter Desnoyers, Deepak Ganesan, and Prashant Shenoy Department of Computer Science University of Massachusetts Amherst, MA 01003 pjd@cs.umass.edu, dganesan@cs.umass.edu, shenoy@cs.umass.edu ABSTRACT Archival storage of sensor data is necessary f...
TSAR: A Two Tier Sensor Storage Architecture Using Interval Skip Graphs * ABSTRACT Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems are designed primarily for flat hierarchies of homogeneous ...
TSAR: A Two Tier Sensor Storage Architecture Using Interval Skip Graphs * ABSTRACT Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems are designed primarily for flat hierarchies of homogeneous ...
TSAR: A Two Tier Sensor Storage Architecture Using Interval Skip Graphs * ABSTRACT Archival storage of sensor data is necessary for applications that query, mine, and analyze such data for interesting features and trends. We argue that existing storage systems are designed primarily for flat hierarchies of homogeneous ...
C-52
Fairness in Dead-Reckoning based Distributed Multi-Player Games
In a distributed multi-player game that uses dead-reckoning vectors to exchange movement information among players, there is inaccuracy in rendering the objects at the receiver due to network delay between the sender and the receiver. The object is placed at the receiver at the position indicated by the dead-reckoning ...
[ "fair", "dead-reckon", "dead-reckon vector", "accuraci", "mean error", "budget base algorithm", "schedul algorithm", "distribut multi-player game", "quantiz", "export error", "bucket synchron", "network delai", "clock synchron" ]
[ "P", "P", "P", "P", "P", "P", "P", "M", "U", "M", "U", "M", "U" ]
Fairness in Dead-Reckoning based Distributed Multi-Player Games Sudhir Aggarwal Hemant Banavar Department of Computer Science Florida State University, Tallahassee, FL Email: {sudhir, banavar}@cs. fsu.edu Sarit Mukherjee Sampath Rangarajan Center for Networking Research Bell Laboratories, Holmdel, NJ Email: {sarit, sam...
Fairness in Dead-Reckoning based Distributed Multi-Player Games ABSTRACT In a distributed multi-player game that uses dead-reckoning vectors to exchange movement information among players, there is inaccuracy in rendering the objects at the receiver due to network delay between the sender and the receiver. The object i...
Fairness in Dead-Reckoning based Distributed Multi-Player Games ABSTRACT In a distributed multi-player game that uses dead-reckoning vectors to exchange movement information among players, there is inaccuracy in rendering the objects at the receiver due to network delay between the sender and the receiver. The object i...
Fairness in Dead-Reckoning based Distributed Multi-Player Games ABSTRACT In a distributed multi-player game that uses dead-reckoning vectors to exchange movement information among players, there is inaccuracy in rendering the objects at the receiver due to network delay between the sender and the receiver. The object i...
H-98
Using Asymmetric Distributions to Improve Text Classifier Probability Estimates
Text classifiers that give probability estimates are more readily applicable in a variety of scenarios. For example, rather than choosing one set decision threshold, they can be used in a Bayesian risk model to issue a run-time decision which minimizes a user-specified cost function dynamically chosen at prediction tim...
[ "text classifi", "probabl estim", "decis threshold", "bayesian risk model", "empir score distribut", "parametr model", "inform retriev", "logist regress framework", "posterior function", "asymmetr laplac distribut", "search engin retriev", "symmetr distribut", "asymmetr gaussian", "maximum...
[ "P", "P", "P", "P", "P", "M", "U", "U", "M", "M", "U", "M", "M", "M", "U", "M", "U", "U", "M" ]
Using Asymmetric Distributions to Improve Text Classifier Probability Estimates Paul N. Bennett Computer Science Dept. Carnegie Mellon University Pittsburgh, PA 15213 pbennett+@cs.cmu.edu ABSTRACT Text classifiers that give probability estimates are more readily applicable in a variety of scenarios. For example, rather...
Using Asymmetric Distributions to Improve Text Classifier Probability Estimates ABSTRACT Text classifiers that give probability estimates are more readily applicable in a variety of scenarios. For example, rather than choosing one set decision threshold, they can be used in a Bayesian risk model to issue a run-time dec...
Using Asymmetric Distributions to Improve Text Classifier Probability Estimates ABSTRACT Text classifiers that give probability estimates are more readily applicable in a variety of scenarios. For example, rather than choosing one set decision threshold, they can be used in a Bayesian risk model to issue a run-time dec...
Using Asymmetric Distributions to Improve Text Classifier Probability Estimates ABSTRACT Text classifiers that give probability estimates are more readily applicable in a variety of scenarios. For example, rather than choosing one set decision threshold, they can be used in a Bayesian risk model to issue a run-time dec...
H-73
Unified Utility Maximization Framework for Resource Selection
This paper presents a unified utility framework for resource selection of distributed text information retrieval. This new framework shows an efficient and effective way to infer the probabilities of relevance of all the documents across the text databases. With the estimated relevance information, resource selection c...
[ "resourc select", "databas recommend", "distribut document retriev", "distribut inform retriev", "distribut text inform retriev resourc select", "feder search", "hidden web content", "resourc represent", "retriev and result merg", "logist transform model", "semi-supervis learn", "unifi util ma...
[ "P", "P", "P", "P", "R", "U", "U", "M", "M", "M", "U", "R" ]
Unified Utility Maximization Framework for Resource Selection Luo Si Language Technology Inst. School of Compute Science Carnegie Mellon University Pittsburgh, PA 15213 lsi@cs.cmu.edu Jamie Callan Language Technology Inst. School of Compute Science Carnegie Mellon University Pittsburgh, PA 15213 callan@cs.cmu.edu ABSTR...
Unified Utility Maximization Framework for Resource Selection ABSTRACT This paper presents a unified utility framework for resource selection of distributed text information retrieval. This new framework shows an efficient and effective way to infer the probabilities of relevance of all the documents across the text da...
Unified Utility Maximization Framework for Resource Selection ABSTRACT This paper presents a unified utility framework for resource selection of distributed text information retrieval. This new framework shows an efficient and effective way to infer the probabilities of relevance of all the documents across the text da...
Unified Utility Maximization Framework for Resource Selection ABSTRACT This paper presents a unified utility framework for resource selection of distributed text information retrieval. This new framework shows an efficient and effective way to infer the probabilities of relevance of all the documents across the text da...
H-42
HITS Hits TREC: Exploring IR Evaluation Results with Network Analysis
We propose a novel method of analysing data gathered from TREC or similar information retrieval evaluation experiments. We define two normalized versions of average precision, that we use to construct a weighted bipartite graph of TREC systems and topics. We analyze the meaning of well known -- and somewhat generalized...
[ "hit", "trec", "ir evalu", "network analysi", "inform retriev evalu experi", "weight bipartit graph", "social network analysi", "system-topic graph", "hit algorithm", "human assessor", "mean averag precis", "web search engin implement", "link analysi techniqu", "inlink", "pagerank", "s...
[ "P", "P", "P", "P", "P", "P", "P", "M", "M", "U", "R", "U", "M", "U", "U", "U", "M" ]
HITS Hits TRECExploring IR Evaluation Results with Network Analysis Stefano Mizzaro Dept. of Mathematics and Computer Science University of Udine Via delle Scienze, 206 - 33100 Udine, Italy mizzaro@dimi.uniud.it Stephen Robertson Microsoft Research 7 JJ Thomson Avenue Cambridge CB3 0FB, UK ser@microsoft.com ABSTRACT We...
HITS Hits TREC--Exploring IR Evaluation Results with Network Analysis ABSTRACT We propose a novel method of analysing data gathered from TREC or similar information retrieval evaluation experiments. We define two normalized versions of average precision, that we use to construct a weighted bipartite graph of TREC syste...
HITS Hits TREC--Exploring IR Evaluation Results with Network Analysis ABSTRACT We propose a novel method of analysing data gathered from TREC or similar information retrieval evaluation experiments. We define two normalized versions of average precision, that we use to construct a weighted bipartite graph of TREC syste...
HITS Hits TREC--Exploring IR Evaluation Results with Network Analysis ABSTRACT We propose a novel method of analysing data gathered from TREC or similar information retrieval evaluation experiments. We define two normalized versions of average precision, that we use to construct a weighted bipartite graph of TREC syste...
H-95
Handling Locations in Search Engine Queries
This paper proposes simple techniques for handling place references in search engine queries, an important aspect of geographical information retrieval. We address not only the detection, but also the disambiguation of place references, by matching them explicitly with concepts at an ontology. Moreover, when a query do...
[ "search engin queri", "place refer", "geograph inform retriev", "geograph context", "name entiti recognit algorithm", "ner", "disambigu result", "textual string", "web search engin", "queri string", "search queri", "locationimplicit queri", "geograph ontolog", "geograph type express", "t...
[ "P", "P", "P", "M", "U", "U", "M", "U", "M", "M", "R", "M", "R", "M", "U", "U", "M", "U", "M" ]
Handling Locations in Search Engine Queries Bruno Martins, Mário J. Silva, Sérgio Freitas and Ana Paula Afonso Faculdade de Ciências da Universidade de Lisboa 1749-016 Lisboa, Portugal {bmartins,mjs,sfreitas,apa}@xldb. di.fc.ul.pt ABSTRACT This paper proposes simple techniques for handling place references in search en...
Handling Locations in Search Engine Queries ABSTRACT This paper proposes simple techniques for handling place references in search engine queries, an important aspect of geographical information retrieval. We address not only the detection, but also the disambiguation of place references, by matching them explicitly wi...
Handling Locations in Search Engine Queries ABSTRACT This paper proposes simple techniques for handling place references in search engine queries, an important aspect of geographical information retrieval. We address not only the detection, but also the disambiguation of place references, by matching them explicitly wi...
Handling Locations in Search Engine Queries ABSTRACT This paper proposes simple techniques for handling place references in search engine queries, an important aspect of geographical information retrieval. We address not only the detection, but also the disambiguation of place references, by matching them explicitly wi...
H-81
Distance Measures for MPEG-7-based Retrieval
In visual information retrieval the careful choice of suitable proximity measures is a crucial success factor. The evaluation presented in this paper aims at showing that the distance measures suggested by the MPEG-7 group for the visual descriptors can be beaten by general-purpose measures. Eight visual MPEG-7 descrip...
[ "distanc measur", "distanc measur", "mpeg-7", "visual inform retriev", "visual descriptor", "media collect", "perform indic", "mpeg-7-base retriev", "visual media", "meehl index", "human similar percept", "predic-base model", "content-base imag retriev", "content-base video retriev", "si...
[ "P", "P", "P", "P", "P", "P", "P", "M", "R", "U", "U", "M", "M", "M", "M", "U" ]
Distance Measures for MPEG-7-based Retrieval Horst Eidenberger Vienna University of Technology, Institute of Software Technology and Interactive Systems Favoritenstrasse 9-11 - A-1040 Vienna, Austria Tel. + 43-1-58801-18853 eidenberger@ims.tuwien.ac.at ABSTRACT In visual information retrieval the careful choice of suit...
Distance Measures for MPEG-7-based Retrieval ABSTRACT In visual information retrieval the careful choice of suitable proximity measures is a crucial success factor. The evaluation presented in this paper aims at showing that the distance measures suggested by the MPEG-7 group for the visual descriptors can be beaten by...
Distance Measures for MPEG-7-based Retrieval ABSTRACT In visual information retrieval the careful choice of suitable proximity measures is a crucial success factor. The evaluation presented in this paper aims at showing that the distance measures suggested by the MPEG-7 group for the visual descriptors can be beaten by...
Distance Measures for MPEG-7-based Retrieval ABSTRACT In visual information retrieval the careful choice of suitable proximity measures is a crucial success factor. The evaluation presented in this paper aims at showing that the distance measures suggested by the MPEG-7 group for the visual descriptors can be beaten by...
J-53
A Price-Anticipating Resource Allocation Mechanism for Distributed Shared Clusters
In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed market-based resource allocation system. Multiple users decide how to distribute their budget (bids) among multiple machines according to their individual preferences to maximize their individual utility....
[ "resourc alloc", "distribut share cluster", "util", "effici", "fair", "simul", "algorithm", "bid mechan", "price-anticip scheme", "nash equilibrium", "parallel", "anarchi price", "price-anticip mechan" ]
[ "P", "P", "P", "P", "P", "P", "U", "R", "R", "M", "U", "U", "R" ]
A Price-Anticipating Resource Allocation Mechanism for Distributed Shared Clusters Michal Feldman∗ mfeldman@sims.berkeley.edu Kevin Lai† kevin.lai@hp.com Li Zhang† l.zhang@hp.com ABSTRACT In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed marketbased reso...
A Price-Anticipating Resource Allocation Mechanism for Distributed Shared Clusters ABSTRACT In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed marketbased resource allocation system. Multiple users decide how to distribute their budget (bids) among multip...
A Price-Anticipating Resource Allocation Mechanism for Distributed Shared Clusters ABSTRACT In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed marketbased resource allocation system. Multiple users decide how to distribute their budget (bids) among multip...
A Price-Anticipating Resource Allocation Mechanism for Distributed Shared Clusters ABSTRACT In this paper we formulate the fixed budget resource allocation game to understand the performance of a distributed marketbased resource allocation system. Multiple users decide how to distribute their budget (bids) among multip...
C-77
Tracking Immediate Predecessors in Distributed Computations
A distributed computation is usually modeled as a partially ordered set of relevant events (the relevant events are a subset of the primitive events produced by the computation). An important causality-related distributed computing problem, that we call the Immediate Predecessors Tracking (IPT) problem, consists in ass...
[ "immedi predecessor", "distribut comput", "relev event", "immedi predecessor track", "transit reduct", "hass diagram", "timestamp", "piggyback", "control inform", "ipt protocol", "common global memori", "messag transfer delai", "vector clock", "track causal", "vector timestamp", "chann...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "U", "M", "U", "R", "M", "M", "M", "R", "U" ]
Tracking Immediate Predecessors in Distributed Computations Emmanuelle Anceaume Jean-Michel H´elary Michel Raynal IRISA, Campus Beaulieu 35042 Rennes Cedex, France FirstName.LastName@irisa.fr ABSTRACT A distributed computation is usually modeled as a partially ordered set of relevant events (the relevant events are a s...
Tracking Immediate Predecessors in Distributed Computations ABSTRACT A distributed computation is usually modeled as a partially ordered set of relevant events (the relevant events are a subset of the primitive events produced by the computation). An important causality-related distributed computing problem, that we ca...
Tracking Immediate Predecessors in Distributed Computations ABSTRACT A distributed computation is usually modeled as a partially ordered set of relevant events (the relevant events are a subset of the primitive events produced by the computation). An important causality-related distributed computing problem, that we ca...
Tracking Immediate Predecessors in Distributed Computations ABSTRACT A distributed computation is usually modeled as a partially ordered set of relevant events (the relevant events are a subset of the primitive events produced by the computation). An important causality-related distributed computing problem, that we ca...
J-47
On the Computational Power of Iterative Auctions
We embark on a systematic analysis of the power and limitations of iterative combinatorial auctions. Most existing iterative combinatorial auctions are based on repeatedly suggesting prices for bundles of items, and querying the bidders for their demand under these prices. We prove a large number of results showing the...
[ "combinatori auction", "price", "bidder", "demand queri", "polynomi demand", "ascend-price auction", "bound", "approxim factor", "optim alloc", "prefer elicit", "ascend auction", "commun complex" ]
[ "P", "P", "P", "P", "R", "M", "U", "U", "U", "U", "M", "U" ]
On the Computational Power of Iterative Auctions∗ [Extended Abstract] Liad Blumrosen School of Engineering and Computer Science The Hebrew University of Jerusalem Jerusalem, Israel liad@cs.huji.ac.il Noam Nisan School of Engineering and Computer Science The Hebrew University of Jerusalem Jerusalem, Israel noam@cs.huji....
On the Computational Power of Iterative Auctions * ABSTRACT We embark on a systematic analysis of the power and limitations of iterative combinatorial auctions. Most existing iterative combinatorial auctions are based on repeatedly suggesting prices for bundles of items, and querying the bidders for their "demand" unde...
On the Computational Power of Iterative Auctions * ABSTRACT We embark on a systematic analysis of the power and limitations of iterative combinatorial auctions. Most existing iterative combinatorial auctions are based on repeatedly suggesting prices for bundles of items, and querying the bidders for their "demand" unde...
On the Computational Power of Iterative Auctions * ABSTRACT We embark on a systematic analysis of the power and limitations of iterative combinatorial auctions. Most existing iterative combinatorial auctions are based on repeatedly suggesting prices for bundles of items, and querying the bidders for their "demand" unde...
C-62
Network Monitors and Contracting Systems: Competition and Innovation
Today's Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducing new services, ISPs are presently moving towards greater commoditization. It is apparent that the network's primitive system of contracts does not ali...
[ "network monitor", "monitor", "contract system", "contract", "innov", "commodit", "incent", "smart market", "rout stagequ", "verifi monitor", "contract monitor", "rout polici", "clean-slate architectur design" ]
[ "P", "P", "P", "P", "P", "P", "P", "U", "M", "M", "R", "M", "M" ]
Network Monitors and Contracting Systems: Competition and Innovation Paul Laskowski John Chuang UC Berkeley {paul,chuang}@sims. berkeley.edu ABSTRACT Today``s Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducin...
Network Monitors and Contracting Systems: Competition and Innovation ABSTRACT Today's Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducing new services, ISPs are presently moving towards greater commoditization...
Network Monitors and Contracting Systems: Competition and Innovation ABSTRACT Today's Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducing new services, ISPs are presently moving towards greater commoditization...
Network Monitors and Contracting Systems: Competition and Innovation ABSTRACT Today's Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducing new services, ISPs are presently moving towards greater commoditization...
J-52
Hidden-Action in Multi-Hop Routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not the end-to-end transmission was successful. Therefore, in the absence of incentives to the contrary, rational (i.e., selfish) intermediate node...
[ "multi-hop", "rout", "multi-hop network", "intermedi node", "endpoint", "incent", "prioriti", "contract", "mechan", "cost", "failur caus", "hidden action", "moral hazard", "princip-agent model", "hidden-action", "mechan design", "moralhazard" ]
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "U", "U", "R", "U", "M", "U", "R", "U" ]
Hidden-Action in Multi-Hop Routing Michal Feldman1 mfeldman@sims.berkeley.edu John Chuang1 chuang@sims.berkeley.edu Ion Stoica2 istoica@cs.berkeley.edu Scott Shenker2 shenker@icir.org 1 School of Information Management and Systems U.C. Berkeley 2 Computer Science Division U.C. Berkeley ABSTRACT In multi-hop networks, t...
Hidden-Action in Multi-Hop Routing ABSTRACT In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not the end-to-end transmission was successful. Therefore, in the absence of incentives to the contrary...
Hidden-Action in Multi-Hop Routing ABSTRACT In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not the end-to-end transmission was successful. Therefore, in the absence of incentives to the contrary...
Hidden-Action in Multi-Hop Routing ABSTRACT In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not the end-to-end transmission was successful. Therefore, in the absence of incentives to the contrary...
C-76
Assured Service Quality by Improved Fault Management Service-Oriented Event Correlation
The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today's event correlation mainly addresses the correlation of events as reported from management tools. However, a correlation of user trouble reports concerning services should also be perform...
[ "fault manag", "event correl", "process manag framework", "servic manag", "servic-orient event correl", "servic level agreement", "qo", "custom servic manag", "servic-orient manag", "case-base reason", "rule-base reason" ]
[ "P", "P", "P", "P", "M", "M", "U", "M", "M", "U", "U" ]
Assured Service Quality by Improved Fault Management Service-Oriented Event Correlation Andreas Hanemann Munich Network Management Team Leibniz Supercomputing Center Barer Str. 21, D-80333 Munich, Germany hanemann@lrz.de Martin Sailer Munich Network Management Team University of Munich (LMU) Oettingenstr. 67, D-80538 M...
Assured Service Quality by Improved Fault Management Service-Oriented Event Correlation ABSTRACT The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today's event correlation mainly addresses the correlation of events as reported from management...
Assured Service Quality by Improved Fault Management Service-Oriented Event Correlation ABSTRACT The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today's event correlation mainly addresses the correlation of events as reported from management...
Assured Service Quality by Improved Fault Management Service-Oriented Event Correlation ABSTRACT The paradigm shift from device-oriented to service-oriented management has also implications to the area of event correlation. Today's event correlation mainly addresses the correlation of events as reported from management...
H-43
Combining Content and Link for Classification using Matrix Factorization
The world wide web contains rich textual contents that are interconnected via complex hyperlinks. This huge database violates the assumption held by most of conventional statistical methods that each web page is considered as an independent and identical sample. It is thus difficult to apply traditional mining or learn...
[ "combin content and link", "classif", "matrix factor", "web mine problem", "link structur", "content inform", "author inform", "joint factor", "linkag adjac matrix", "document-term matrix", "low-dimension factor space", "webkb and cora benchmark", "relationship", "asymmetr relationship", ...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "U", "U", "U", "M", "R" ]
Combining Content and Link for Classification using Matrix Factorization Shenghuo Zhu Kai Yu Yun Chi Yihong Gong {zsh,kyu,ychi,ygong}@sv. nec-labs. com NEC Laboratories America, Inc. 10080 North Wolfe Road SW3-350 Cupertino, CA 95014, USA ABSTRACT The world wide web contains rich textual contents that are interconnecte...
Combining Content and Link for Classification using Matrix Factorization ABSTRACT The world wide web contains rich textual contents that are interconnected via complex hyperlinks. This huge database violates the assumption held by most of conventional statistical methods that each web page is considered as an independe...
Combining Content and Link for Classification using Matrix Factorization ABSTRACT The world wide web contains rich textual contents that are interconnected via complex hyperlinks. This huge database violates the assumption held by most of conventional statistical methods that each web page is considered as an independe...
Combining Content and Link for Classification using Matrix Factorization ABSTRACT The world wide web contains rich textual contents that are interconnected via complex hyperlinks. This huge database violates the assumption held by most of conventional statistical methods that each web page is considered as an independe...
H-69
Ranking Web Objects from Multiple Communities
Vertical search is a promising direction as it leverages domain-specific knowledge and can provide more precise information for users. In this paper, we study the Web object-ranking problem, one of the key issues in building a vertical search engine. More specifically, we focus on this problem in cases when objects lac...
[ "rank", "web object", "vertic search", "web object-rank", "web object-rank problem", "score fusion method", "duplic photo detect algorithm", "algorithm", "domain specif knowledg", "high-qualiti photo search", "imag search queri", "rank photo", "multipl web forum", "nonlinear fusion method"...
[ "P", "P", "P", "P", "P", "P", "P", "P", "M", "M", "M", "R", "R", "M", "M", "M" ]
Ranking Web Objects from Multiple Communities Le Chen ∗ Le.Chen@idiap.ch Lei Zhang leizhang@ microsoft.com Feng Jing fengjing@ microsoft.com Ke-Feng Deng kefengdeng@hotmail.com Wei-Ying Ma wyma@microsoft.com Microsoft Research Asia 5F, Sigma Center, No. 49, Zhichun Road Haidian District, Beijing, 100080, P R China ABST...
Ranking Web Objects from Multiple Communities ABSTRACT Vertical search is a promising direction as it leverages domainspecific knowledge and can provide more precise information for users. In this paper, we study the Web object-ranking problem, one of the key issues in building a vertical search engine. More specifical...
Ranking Web Objects from Multiple Communities ABSTRACT Vertical search is a promising direction as it leverages domainspecific knowledge and can provide more precise information for users. In this paper, we study the Web object-ranking problem, one of the key issues in building a vertical search engine. More specifical...
Ranking Web Objects from Multiple Communities ABSTRACT Vertical search is a promising direction as it leverages domainspecific knowledge and can provide more precise information for users. In this paper, we study the Web object-ranking problem, one of the key issues in building a vertical search engine. More specifical...
H-41
HITS on the Web: How does it Compare?
This paper describes a large-scale evaluation of the effectiveness of HITS in comparison with other link-based ranking algorithms, when used in combination with a state-of-the-art text retrieval algorithm exploiting anchor text. We quantified their effectiveness using three common performance measures: the mean recipro...
[ "hit", "rank", "rank", "mean reciproc rank", "mean averag precis", "normal discount cumul gain measur", "breadth-first search crawl", "pagerank", "queri specif", "bm25f", "featur select", "link graph", "scale and relev", "link-base featur", "hyperlink analysi", "quantit measur", "cra...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "R", "U", "M", "M", "M", "M", "R", "U", "U", "U" ]
HITS on the Web: How does it Compare? Marc Najork Microsoft Research 1065 La Avenida Mountain View, CA, USA najork@microsoft.com Hugo Zaragoza ∗ Yahoo! Research Barcelona Ocata 1 Barcelona 08003, Spain hugoz@es.yahoo-inc.com Michael Taylor Microsoft Research 7 J J Thompson Ave Cambridge CB3 0FB, UK mitaylor@microsoft.c...
SIGIR 2007 Proceedings Session 20: Link Analysis HITS on the Web: How does it Compare? * ABSTRACT This paper describes a large-scale evaluation of the effectiveness of HITS in comparison with other link-based ranking algorithms, when used in combination with a state-ofthe-art text retrieval algorithm exploiting anchor ...
SIGIR 2007 Proceedings Session 20: Link Analysis HITS on the Web: How does it Compare? * ABSTRACT This paper describes a large-scale evaluation of the effectiveness of HITS in comparison with other link-based ranking algorithms, when used in combination with a state-ofthe-art text retrieval algorithm exploiting anchor ...
SIGIR 2007 Proceedings Session 20: Link Analysis HITS on the Web: How does it Compare? * ABSTRACT This paper describes a large-scale evaluation of the effectiveness of HITS in comparison with other link-based ranking algorithms, when used in combination with a state-ofthe-art text retrieval algorithm exploiting anchor ...
H-82
Downloading Textual Hidden Web Content Through Keyword Queries
An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to access the pages from certain Web sites. These pages are often referred to as the Hidden Web or the Deep Web. Since there are no static links to...
[ "hidden web", "keyword queri", "deep web", "hidden web crawler", "queri-select polici", "crawl polici", "textual databas", "gener-frequenc polici", "independ estim", "adapt polici", "hide web crawl", "deep web crawler", "adapt algorithm", "queri select" ]
[ "P", "P", "P", "P", "M", "M", "M", "M", "U", "M", "M", "R", "U", "M" ]
Downloading Textual Hidden Web Content Through Keyword Queries Alexandros Ntoulas UCLA Computer Science ntoulas@cs.ucla.edu Petros Zerfos UCLA Computer Science pzerfos@cs.ucla.edu Junghoo Cho UCLA Computer Science cho@cs.ucla.edu ABSTRACT An ever-increasing amount of information on the Web today is available only throu...
Downloading Textual Hidden Web Content Through Keyword Queries ABSTRACT An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to access the pages from certain Web sites. These pages are often referred ...
Downloading Textual Hidden Web Content Through Keyword Queries ABSTRACT An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to access the pages from certain Web sites. These pages are often referred ...
Downloading Textual Hidden Web Content Through Keyword Queries ABSTRACT An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to access the pages from certain Web sites. These pages are often referred ...
H-96
A Study of Factors Affecting the Utility of Implicit Relevance Feedback
Implicit relevance feedback (IRF) is the process by which a search system unobtrusively gathers evidence on searcher interests from their interaction with the system. IRF is a new method of gathering information on user interest and, if IRF is to be used in operational IR systems, it is important to establish when it p...
[ "implicit relev feedback", "relev feedback", "search task complex", "brows-base result interfac", "top-rank sentenc", "queri modif term", "explicit rf system", "interact queri expans featur", "high complex whilst", "moder complex whilst", "introductori questionnair", "vari complex", "medium ...
[ "P", "P", "P", "U", "U", "U", "M", "M", "M", "M", "U", "M", "M", "M", "M" ]
A Study of Factors Affecting the Utility of Implicit Relevance Feedback Ryen W. White Human-Computer Interaction Laboratory Institute for Advanced Computer Studies University of Maryland College Park, MD 20742, USA ryen@umd.edu Ian Ruthven Department of Computer and Information Sciences University of Strathclyde Glasgo...
A Study of Factors Affecting the Utility of Implicit Relevance Feedback ABSTRACT Implicit relevance feedback (IRF) is the process by which a search system unobtrusively gathers evidence on searcher interests from their interaction with the system. IRF is a new method of gathering information on user interest and, if IR...
A Study of Factors Affecting the Utility of Implicit Relevance Feedback ABSTRACT Implicit relevance feedback (IRF) is the process by which a search system unobtrusively gathers evidence on searcher interests from their interaction with the system. IRF is a new method of gathering information on user interest and, if IR...
A Study of Factors Affecting the Utility of Implicit Relevance Feedback ABSTRACT Implicit relevance feedback (IRF) is the process by which a search system unobtrusively gathers evidence on searcher interests from their interaction with the system. IRF is a new method of gathering information on user interest and, if IR...
C-48
Multi-dimensional Range Queries in Sensor Networks
In many sensor networks, data or events are named by attributes. Many of these attributes have scalar values, so one natural way to query events of interest is to use a multidimensional range query. An example is: List all events whose temperature lies between 50◦ and 60◦ , and whose light levels lie between 10 and 15....
[ "multi-dimension rang queri", "dim", "sensor network", "multidimension rang queri", "distribut index", "geograph rout", "queri cost", "central index", "distribut data structur", "datacentr storag system", "event insert", "index techniqu", "queri flood", "effici correl", "local-preserv ge...
[ "P", "P", "P", "P", "P", "P", "P", "M", "R", "U", "R", "M", "M", "M", "M", "U", "M" ]
Multi-dimensional Range Queries in Sensor Networks∗ Xin Li † Young Jin Kim † Ramesh Govindan † Wei Hong ‡ ABSTRACT In many sensor networks, data or events are named by attributes. Many of these attributes have scalar values, so one natural way to query events of interest is to use a multidimensional range query. An exa...
Multi-dimensional Range Queries in Sensor Networks * ABSTRACT In many sensor networks, data or events are named by attributes. Many of these attributes have scalar values, so one natural way to query events of interest is to use a multidimensional range query. An example is: "List all events whose temperature lies betw...
Multi-dimensional Range Queries in Sensor Networks * ABSTRACT In many sensor networks, data or events are named by attributes. Many of these attributes have scalar values, so one natural way to query events of interest is to use a multidimensional range query. An example is: "List all events whose temperature lies betw...
Multi-dimensional Range Queries in Sensor Networks * ABSTRACT In many sensor networks, data or events are named by attributes. Many of these attributes have scalar values, so one natural way to query events of interest is to use a multidimensional range query. An example is: "List all events whose temperature lies betw...
J-44
Scouts, Promoters, and Connectors: The Roles of Ratings in Nearest Neighbor Collaborative Filtering
Recommender systems aggregate individual user ratings into predictions of products or services that might interest visitors. The quality of this aggregation process crucially affects the user experience and hence the effectiveness of recommenders in e-commerce. We present a novel study that disaggregates global recomme...
[ "scout", "promot", "connector", "rate", "nearest neighbor", "collabor filter", "recommend", "recommend system", "aggreg process", "neighborhood", "collabor filter algorithm", "purchas", "opinion", "list rank accuraci", "user-base and item-base algorithm" ]
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "U", "U", "U", "M" ]
Scouts, Promoters, and Connectors: The Roles of Ratings in Nearest Neighbor Collaborative Filtering Bharath Kumar Mohan Dept. of CSA Indian Institute of Science Bangalore 560 012, India mbk@csa.iisc.ernet.in Benjamin J. Keller Dept. of Computer Science Eastern Michigan University Ypsilanti, MI 48917, USA bkeller@emich....
Scouts, Promoters, and Connectors: The Roles of Ratings in Nearest Neighbor Collaborative Filtering ABSTRACT Recommender systems aggregate individual user ratings into predictions of products or services that might interest visitors. The quality of this aggregation process crucially affects the user experience and henc...
Scouts, Promoters, and Connectors: The Roles of Ratings in Nearest Neighbor Collaborative Filtering ABSTRACT Recommender systems aggregate individual user ratings into predictions of products or services that might interest visitors. The quality of this aggregation process crucially affects the user experience and henc...
Scouts, Promoters, and Connectors: The Roles of Ratings in Nearest Neighbor Collaborative Filtering ABSTRACT Recommender systems aggregate individual user ratings into predictions of products or services that might interest visitors. The quality of this aggregation process crucially affects the user experience and henc...
C-74
Adapting Asynchronous Messaging Middleware to ad-hoc Networking
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particular, the synchronous communication paradigms often employed in standard middleware do not appear to be particularly suited to ad-hoc environme...
[ "asynchron messag middlewar", "asynchron commun", "messag orient middlewar", "epidem messag middlewar", "java messag servic", "mobil ad-hoc environ", "messag-orient middlewar", "epidem protocol", "cross-layer", "applic level rout", "group commun", "middlewar for mobil comput", "mobil ad-hoc ...
[ "P", "P", "P", "P", "P", "P", "M", "M", "U", "M", "M", "R", "R", "U" ]
Adapting Asynchronous Messaging Middleware to ad-hoc Networking Mirco Musolesi Dept. of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom m.musolesi@cs.ucl.ac.uk Cecilia Mascolo Dept. of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom c.m...
Adapting Asynchronous Messaging Middleware to Ad Hoc Networking ABSTRACT The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particular, the synchronous communication paradigms often employed in standa...
Adapting Asynchronous Messaging Middleware to Ad Hoc Networking ABSTRACT The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particular, the synchronous communication paradigms often employed in standa...
Adapting Asynchronous Messaging Middleware to Ad Hoc Networking ABSTRACT The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particular, the synchronous communication paradigms often employed in standa...
J-50
Communication Complexity of Common Voting Rules
We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, single transferable vote (STV), Condorcet, approval, Bucklin, cup, maximin, Borda, Copeland, and ranked pairs. For each rule, we first give a ...
[ "commun", "commun complex", "complex", "vote rule", "vote", "stv", "maximin", "protocol", "prefer", "prefer aggreg", "resourc alloc", "elicit problem" ]
[ "P", "P", "P", "P", "P", "P", "P", "P", "U", "U", "U", "U" ]
Communication Complexity of Common Voting Rules∗ Vincent Conitzer Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA conitzer@cs.cmu.edu Tuomas Sandholm Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA sandholm@cs.cmu.edu ABSTRACT We determine the communication complexity of ...
Communication Complexity of Common Voting Rules * ABSTRACT We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, single transferable vote (STV), Condorcet, approval, Bucklin, cup, maximin, Borda, ...
Communication Complexity of Common Voting Rules * ABSTRACT We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, single transferable vote (STV), Condorcet, approval, Bucklin, cup, maximin, Borda, ...
Communication Complexity of Common Voting Rules * ABSTRACT We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, single transferable vote (STV), Condorcet, approval, Bucklin, cup, maximin, Borda, ...
C-75
Composition of a DIDS by Integrating Heterogeneous IDSs on Grids
This paper considers the composition of a DIDS (Distributed Intrusion Detection System) by integrating heterogeneous IDSs (Intrusion Detection Systems). A Grid middleware is used for this integration. In addition, an architecture for this integration is proposed and validated through simulation.
[ "grid", "distribut intrus detect system", "intrus detect system", "grid middlewar", "heterogen intrus detect system", "open grid servic architectur", "comput grid", "intrus detect servic", "grid intrus detect architectur", "id integr", "gridsim grid simul", "grid servic for intrus detect", "...
[ "P", "P", "P", "P", "R", "M", "M", "M", "R", "M", "M", "M", "R" ]
Composition of a DIDS by Integrating Heterogeneous IDSs on Grids Paulo F. Silva and Carlos B. Westphall and Carla M. Westphall Network and Management Laboratory Department of Computer Science and Statistics Federal University of Santa Catarina, Florianópolis, Brazil Marcos D. Assunção Grid Computing and Distributed Sys...
Composition of a DIDS by Integrating Heterogeneous IDSs on Grids ABSTRACT This paper considers the composition of a DIDS (Distributed Intrusion Detection System) by integrating heterogeneous IDSs (Intrusion Detection Systems). A Grid middleware is used for this integration. In addition, an architecture for this integra...
Composition of a DIDS by Integrating Heterogeneous IDSs on Grids ABSTRACT This paper considers the composition of a DIDS (Distributed Intrusion Detection System) by integrating heterogeneous IDSs (Intrusion Detection Systems). A Grid middleware is used for this integration. In addition, an architecture for this integra...
Composition of a DIDS by Integrating Heterogeneous IDSs on Grids ABSTRACT This paper considers the composition of a DIDS (Distributed Intrusion Detection System) by integrating heterogeneous IDSs (Intrusion Detection Systems). A Grid middleware is used for this integration. In addition, an architecture for this integra...
J-51
Complexity of (Iterated) Dominance
We study various computational aspects of solving games using dominance and iterated dominance. We first study both strict and weak dominance (not iterated), and show that checking whether a given strategy is dominated by some mixed strategy can be done in polynomial time using a single linear program solve. We then mo...
[ "domin", "domin", "iter domin", "strategi", "elimin", "bayesian game", "normal form game", "multiag system", "self-interest agent", "optim action", "game theori", "nash equilibrium" ]
[ "P", "P", "P", "P", "P", "P", "P", "U", "U", "U", "M", "U" ]
Complexity of (Iterated) Dominance∗ Vincent Conitzer Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA conitzer@cs.cmu.edu Tuomas Sandholm Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213, USA sandholm@cs.cmu.edu ABSTRACT We study various computational aspects of solving games us...
Complexity of (Iterated) Dominance * ABSTRACT We study various computational aspects of solving games using dominance and iterated dominance. We first study both strict and weak dominance (not iterated), and show that checking whether a given strategy is dominated by some mixed strategy can be done in polynomial time u...
Complexity of (Iterated) Dominance * ABSTRACT We study various computational aspects of solving games using dominance and iterated dominance. We first study both strict and weak dominance (not iterated), and show that checking whether a given strategy is dominated by some mixed strategy can be done in polynomial time u...
Complexity of (Iterated) Dominance * ABSTRACT We study various computational aspects of solving games using dominance and iterated dominance. We first study both strict and weak dominance (not iterated), and show that checking whether a given strategy is dominated by some mixed strategy can be done in polynomial time u...
J-45
Empirical Mechanism Design: Methods, with Application to a Supply-Chain Scenario
Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with a design task from a supply-chain trading competition. Designers adopted several rule changes in order to deter particular procurement behavi...
[ "empir mechan", "empir mechan design", "paramet set", "analysi", "observ behavior", "interest outcom featur", "suppli-chain trade", "two-stage game", "player", "particip", "gametheoret model", "nash equilibrium", "game theori" ]
[ "P", "P", "P", "P", "P", "R", "M", "U", "U", "U", "M", "U", "U" ]
Empirical Mechanism Design: Methods, with Application to a Supply-Chain Scenario Yevgeniy Vorobeychik, Christopher Kiekintveld, and Michael P. Wellman University of Michigan Computer Science & Engineering Ann Arbor, MI 48109-2121 USA { yvorobey, ckiekint, wellman }@umich. edu ABSTRACT Our proposed methods employ learni...
Empirical Mechanism Design: Methods, with Application to a Supply-Chain Scenario ABSTRACT Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with a design task from a supply-chain trading competiti...
Empirical Mechanism Design: Methods, with Application to a Supply-Chain Scenario ABSTRACT Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with a design task from a supply-chain trading competiti...
Empirical Mechanism Design: Methods, with Application to a Supply-Chain Scenario ABSTRACT Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with a design task from a supply-chain trading competiti...
C-61
Authority Assignment in Distributed Multi-Player Proxy-based Games
We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online games. The proposed game architecture consists of distributed game clients that connect to game proxies (referred to as communication proxies) w...
[ "author assign", "author", "commun proxi", "multi-player onlin game", "latenc compens", "artifici latenc", "proxi-base game architectur", "central-server architectur", "first person shooter", "role plai game", "client authorit approach", "cheat-proof mechan", "mmog", "distribut multi-playe...
[ "P", "P", "P", "M", "U", "U", "M", "M", "U", "M", "M", "M", "U", "M" ]
Authority Assignment in Distributed Multi-Player Proxy-based Games Sudhir Aggarwal Justin Christofoli Department of Computer Science Florida State University, Tallahassee, FL {sudhir, christof}@cs. fsu.edu Sarit Mukherjee Sampath Rangarajan Center for Networking Research Bell Laboratories, Holmdel, NJ {sarit, sampath}@...
Authority Assignment in Distributed Multi-Player Proxy-based Games ABSTRACT We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online games. The proposed game architecture consists of distributed game c...
Authority Assignment in Distributed Multi-Player Proxy-based Games ABSTRACT We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online games. The proposed game architecture consists of distributed game c...
Authority Assignment in Distributed Multi-Player Proxy-based Games ABSTRACT We present a proxy-based gaming architecture and authority assignment within this architecture that can lead to better game playing experience in Massively Multi-player Online games. The proposed game architecture consists of distributed game c...
C-49
Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces
Traditional mobile ad-hoc network (MANET) routing protocols assume that contemporaneous end-to-end communication paths exist between data senders and receivers. In some mobile ad-hoc networks with a sparse node population, an end-to-end communication path may break frequently or may not exist at any time. Many routing ...
[ "rout protocol", "rout", "contact trace", "opportunist network", "simul", "prophet", "delai-toler network", "mobil opportunist network", "frequent link break", "end-to-end path", "random mobil model", "realist mobil trace", "unicast", "transfer probabl", "direct-deliveri protocol", "ep...
[ "P", "P", "P", "P", "P", "P", "M", "R", "M", "R", "M", "R", "U", "U", "R", "R", "U", "M" ]
Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces Libo Song and David F. Kotz Institute for Security Technology Studies (ISTS) Department of Computer Science, Dartmouth College, Hanover, NH, USA 03755 ABSTRACT Traditional mobile ad-hoc network (MANET) routing protocols assume that contempor...
Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces ABSTRACT Traditional mobile ad hoc network (MANET) routing protocols assume that contemporaneous end-to-end communication paths exist between data senders and receivers. In some mobile ad hoc networks with a sparse node population, an end-to...
Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces ABSTRACT Traditional mobile ad hoc network (MANET) routing protocols assume that contemporaneous end-to-end communication paths exist between data senders and receivers. In some mobile ad hoc networks with a sparse node population, an end-to...
Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces ABSTRACT Traditional mobile ad hoc network (MANET) routing protocols assume that contemporaneous end-to-end communication paths exist between data senders and receivers. In some mobile ad hoc networks with a sparse node population, an end-to...
H-97
Feature Representation for Effective Action-Item Detection
E-mail users face an ever-growing challenge in managing their inboxes due to the growing centrality of email in the workplace for task assignment, action requests, and other roles beyond information dissemination. Whereas Information Retrieval and Machine Learning techniques are gaining initial acceptance in spam filte...
[ "action-item detect", "e-mail", "inform retriev", "topic-driven text classif", "text classif", "n-gram", "chi-squar featur select", "featur select", "svm", "autom model select", "embed cross-valid", "text categor", "genr-classif", "e-mail prioriti rank", "speech act identif", "simpl fa...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "U", "M", "U", "U", "M", "U", "M", "M", "U" ]
Feature Representation for Effective Action-Item Detection Paul N. Bennett Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 pbennett+@cs.cmu.edu Jaime Carbonell Language Technologies Institute. Carnegie Mellon University Pittsburgh, PA 15213 jgc+@cs.cmu.edu ABSTRACT E-mail users face an ever-...
Feature Representation for Effective Action-Item Detection ABSTRACT E-mail users face an ever-growing challenge in managing their inboxes due to the growing centrality of email in the workplace for task assignment, action requests, and other roles beyond information dissemination. Whereas Information Retrieval and Mach...
Feature Representation for Effective Action-Item Detection ABSTRACT E-mail users face an ever-growing challenge in managing their inboxes due to the growing centrality of email in the workplace for task assignment, action requests, and other roles beyond information dissemination. Whereas Information Retrieval and Mach...
Feature Representation for Effective Action-Item Detection ABSTRACT E-mail users face an ever-growing challenge in managing their inboxes due to the growing centrality of email in the workplace for task assignment, action requests, and other roles beyond information dissemination. Whereas Information Retrieval and Mach...
H-83
Estimating the Global PageRank of Web Communities
Localized search engines are small-scale systems that index a particular community on the web. They offer several benefits over their large-scale counterparts in that they are relatively inexpensive to build, and can provide more precise and complete search capability over their relevant domains. One disadvantage such ...
[ "global pagerank", "web commun", "local search engin", "algorithm", "local domain", "topic-specif domain", "larg-scale search engin", "link-base rank", "subgraph", "global graph", "crawl problem", "experiment" ]
[ "P", "P", "P", "P", "P", "P", "M", "U", "U", "M", "M", "U" ]
Estimating the Global PageRank of Web Communities Jason V. Davis Dept. of Computer Sciences University of Texas at Austin Austin, TX 78712 jdavis@cs.utexas.edu Inderjit S. Dhillon Dept. of Computer Sciences University of Texas at Austin Austin, TX 78712 inderjit@cs.utexas.edu ABSTRACT Localized search engines are small...
Estimating the Global PageRank of Web Communities ABSTRACT Localized search engines are small-scale systems that index a particular community on the web. They offer several benefits over their large-scale counterparts in that they are relatively inexpensive to build, and can provide more precise and complete search cap...
Estimating the Global PageRank of Web Communities ABSTRACT Localized search engines are small-scale systems that index a particular community on the web. They offer several benefits over their large-scale counterparts in that they are relatively inexpensive to build, and can provide more precise and complete search cap...
Estimating the Global PageRank of Web Communities ABSTRACT Localized search engines are small-scale systems that index a particular community on the web. They offer several benefits over their large-scale counterparts in that they are relatively inexpensive to build, and can provide more precise and complete search cap...
H-54
Knowledge-intensive Conceptual Retrieval and Passage Extraction of Biomedical Literature
This paper presents a study of incorporating domain-specific knowledge (i.e., information about concepts and relationships between concepts in a certain domain) in an information retrieval (IR) system to improve its effectiveness in retrieving biomedical literature. The effects of different types of domain-specific kno...
[ "passag extract", "domain-specif knowledg", "retriev model", "keyword search", "document collect", "passag-level inform retriev", "queri concept", "conceptu ir model", "passag map", "aspect map", "document map", "document retriev", "biomed document" ]
[ "P", "P", "P", "U", "U", "M", "M", "R", "M", "U", "U", "M", "M" ]
Knowledge-intensive Conceptual Retrieval and Passage Extraction of Biomedical Literature Wei Zhou, Clement Yu Department of Computer Science University of Illinois at Chicago wzhou8@uic.edu, yu@cs.uic.edu Neil Smalheiser, Vetle Torvik Department of Psychiatry and Psychiatric Institute (MC912) University of Illinois at ...
Knowledge-intensive Conceptual Retrieval and Passage Extraction of Biomedical Literature ABSTRACT This paper presents a study of incorporating domain-specific knowledge (i.e., information about concepts and relationships between concepts in a certain domain) in an information retrieval (IR) system to improve its effect...
Knowledge-intensive Conceptual Retrieval and Passage Extraction of Biomedical Literature ABSTRACT This paper presents a study of incorporating domain-specific knowledge (i.e., information about concepts and relationships between concepts in a certain domain) in an information retrieval (IR) system to improve its effect...
Knowledge-intensive Conceptual Retrieval and Passage Extraction of Biomedical Literature ABSTRACT This paper presents a study of incorporating domain-specific knowledge (i.e., information about concepts and relationships between concepts in a certain domain) in an information retrieval (IR) system to improve its effect...
H-40
Cross-Lingual Query Suggestion Using Query Logs of Different Languages
Query suggestion aims to suggest relevant queries for a given query, which help users better specify their information needs. Previously, the suggested terms are mostly in the same language of the input query. In this paper, we extend it to cross-lingual query suggestion (CLQS): for a query in one language, we suggest ...
[ "queri suggest", "queri log", "cross-languag inform retriev", "keyword bid", "search engin advertis", "search engin", "queri translat", "map", "benchmark", "queri expans", "bid term", "monolingu queri suggest", "target languag queri log" ]
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "R", "R", "M" ]
Cross-Lingual Query Suggestion Using Query Logs of Different Languages Wei Gao1* , Cheng Niu2 , Jian-Yun Nie3 , Ming Zhou2 , Jian Hu2 , Kam-Fai Wong1 , Hsiao-Wuen Hon2 1 The Chinese University of Hong Kong, Hong Kong, China {wgao, kfwong}@se. cuhk.edu.hk 2 Microsoft Research Asia, Beijing, China {chengniu, mingzhou, ji...
Cross-Lingual Query Suggestion Using Query Logs of Different Languages ABSTRACT Query suggestion aims to suggest relevant queries for a given query, which help users better specify their information needs. Previously, the suggested terms are mostly in the same language of the input query. In this paper, we extend it to...
Cross-Lingual Query Suggestion Using Query Logs of Different Languages ABSTRACT Query suggestion aims to suggest relevant queries for a given query, which help users better specify their information needs. Previously, the suggested terms are mostly in the same language of the input query. In this paper, we extend it to...
Cross-Lingual Query Suggestion Using Query Logs of Different Languages ABSTRACT Query suggestion aims to suggest relevant queries for a given query, which help users better specify their information needs. Previously, the suggested terms are mostly in the same language of the input query. In this paper, we extend it to...
H-44
A Time Machine for Text Search
Text search over temporally versioned document collections such as web archives has received little attention as a research problem. As a consequence, there is no scalable and principled solution to search such a collection as of a specified time t. In this work, we address this shortcoming and propose an efficient sol...
[ "time machin", "text search", "version document collect", "web archiv", "time-travel text search", "invert file index", "tempor search", "approxim tempor coalesc", "collabor author environ", "timestamp inform feed", "document-content overlap", "index rang-base valu", "open sourc search-engin...
[ "P", "P", "P", "P", "P", "P", "P", "P", "U", "U", "U", "M", "U", "M", "U", "U", "R" ]
A Time Machine for Text Search Klaus Berberich Srikanta Bedathur Thomas Neumann Gerhard Weikum Max-Planck Institute for Informatics Saarbr¨ucken, Germany {kberberi, bedathur, neumann, weikum}@mpi-inf.mpg.de ABSTRACT Text search over temporally versioned document collections such as web archives has received little atte...
A Time Machine for Text Search ABSTRACT Text search over temporally versioned document collections such as web archives has received little attention as a research problem. As a consequence, there is no scalable and principled solution to search such a collection as of a specified time t. In this work, we address this ...
A Time Machine for Text Search ABSTRACT Text search over temporally versioned document collections such as web archives has received little attention as a research problem. As a consequence, there is no scalable and principled solution to search such a collection as of a specified time t. In this work, we address this ...
A Time Machine for Text Search ABSTRACT Text search over temporally versioned document collections such as web archives has received little attention as a research problem. As a consequence, there is no scalable and principled solution to search such a collection as of a specified time t. In this work, we address this ...
H-50
An Outranking Approach for Rank Aggregation in Information Retrieval
Research in Information Retrieval usually shows performance improvement when many sources of evidence are combined to produce a ranking of documents (e.g., texts, pictures, sounds, etc.). In this paper, we focus on the rank aggregation problem, also called data fusion problem, where rankings of documents, searched into...
[ "outrank approach", "rank aggreg", "inform retriev", "data fusion problem", "data fusion", "decis rule", "multipl criterion framework", "metasearch engin", "combsum and combmnz strategi", "majoritarian method", "ir model", "multipl criterium approach", "outrank method" ]
[ "P", "P", "P", "P", "P", "P", "M", "U", "M", "M", "U", "M", "R" ]
An Outranking Approach for Rank Aggregation in Information Retrieval Mohamed Farah Lamsade, Paris Dauphine University Place du Mal de Lattre de Tassigny 75775 Paris Cedex 16, France farah@lamsade.dauphine.fr Daniel Vanderpooten Lamsade, Paris Dauphine University Place du Mal de Lattre de Tassigny 75775 Paris Cedex 16, ...
An Outranking Approach for Rank Aggregation in Information Retrieval ABSTRACT Research in Information Retrieval usually shows performance improvement when many sources of evidence are combined to produce a ranking of documents (e.g., texts, pictures, sounds, etc.). In this paper, we focus on the rank aggregation proble...
An Outranking Approach for Rank Aggregation in Information Retrieval ABSTRACT Research in Information Retrieval usually shows performance improvement when many sources of evidence are combined to produce a ranking of documents (e.g., texts, pictures, sounds, etc.). In this paper, we focus on the rank aggregation proble...
An Outranking Approach for Rank Aggregation in Information Retrieval ABSTRACT Research in Information Retrieval usually shows performance improvement when many sources of evidence are combined to produce a ranking of documents (e.g., texts, pictures, sounds, etc.). In this paper, we focus on the rank aggregation proble...
H-87
Robustness of Adaptive Filtering Methods In a Cross-benchmark Evaluation
This paper reports a cross-benchmark evaluation of regularized logistic regression (LR) and incremental Rocchio for adaptive filtering. Using four corpora from the Topic Detection and Tracking (TDT) forum and the Text Retrieval Conferences (TREC) we evaluated these methods with non-stationary topics at various granular...
[ "robust", "adapt filter", "adapt filter", "cross-benchmark evalu", "regular", "logist regress", "lr", "rocchio", "topic detect", "util function", "cross-corpu paramet optim", "relev feedback", "inform retriev", "topic track", "statist learn", "systemat method for paramet tune across mu...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "R", "R", "U", "M", "U", "M", "R", "R", "U", "M", "U", "M", "U", "M", "U", "U" ]
Robustness of Adaptive Filtering Methods In a Cross-benchmark Evaluation Yiming Yang, Shinjae Yoo, Jian Zhang, Bryan Kisiel School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA 15213, USA ABSTRACT This paper reports a cross-benchmark evaluation of regularized logistic regression (LR...
Robustness of Adaptive Filtering Methods In a Cross-benchmark Evaluation ABSTRACT This paper reports a cross-benchmark evaluation of regularized logistic regression (LR) and incremental Rocchio for adaptive filtering. Using four corpora from the Topic Detection and Tracking (TDT) forum and the Text Retrieval Conference...
Robustness of Adaptive Filtering Methods In a Cross-benchmark Evaluation ABSTRACT This paper reports a cross-benchmark evaluation of regularized logistic regression (LR) and incremental Rocchio for adaptive filtering. Using four corpora from the Topic Detection and Tracking (TDT) forum and the Text Retrieval Conference...
Robustness of Adaptive Filtering Methods In a Cross-benchmark Evaluation ABSTRACT This paper reports a cross-benchmark evaluation of regularized logistic regression (LR) and incremental Rocchio for adaptive filtering. Using four corpora from the Topic Detection and Tracking (TDT) forum and the Text Retrieval Conference...
C-65
Shooter Localization and Weapon Classification with Soldier-Wearable Networked Sensors
The paper presents a wireless sensor network-based mobile countersniper system. A sensor node consists of a helmetmounted microphone array, a COTS MICAz mote for internode communication and a custom sensorboard that implements the acoustic detection and Time of Arrival (ToA) estimation algorithms on an FPGA. A 3-axis c...
[ "weapon classif", "internod commun", "sensorboard", "self orient", "data fusion", "trajectori", "rang", "calib", "weapon type", "calib estim accuraci", "calib estim", "wireless sensor network-base mobil countersnip system", "helmetmount microphon arrai", "1degre trajectori precis", "sens...
[ "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "P", "M", "M", "M", "R", "M" ]
Shooter Localization and Weapon Classification with Soldier-Wearable Networked Sensors Peter Volgyesi, Gyorgy Balogh, Andras Nadas, Christopher B. Nash, Akos Ledeczi Institute for Software Integrated Systems, Vanderbilt University Nashville, TN, USA akos.ledeczi@vanderbilt.edu ABSTRACT The paper presents a wireless sen...
Shooter Localization and Weapon Classification with Soldier-Wearable Networked Sensors ABSTRACT The paper presents a wireless sensor network-based mobile countersniper system. A sensor node consists of a helmetmounted microphone array, a COTS MICAz mote for internode communication and a custom sensorboard that implemen...
Shooter Localization and Weapon Classification with Soldier-Wearable Networked Sensors ABSTRACT The paper presents a wireless sensor network-based mobile countersniper system. A sensor node consists of a helmetmounted microphone array, a COTS MICAz mote for internode communication and a custom sensorboard that implemen...
Shooter Localization and Weapon Classification with Soldier-Wearable Networked Sensors ABSTRACT The paper presents a wireless sensor network-based mobile countersniper system. A sensor node consists of a helmetmounted microphone array, a COTS MICAz mote for internode communication and a custom sensorboard that implemen...
J-41
An Analysis of Alternative Slot Auction Designs for Sponsored Search
Billions of dollars are spent each year on sponsored search, a form of advertising where merchants pay for placement alongside web search results. Slots for ad listings are allocated via an auction-style mechanism where the higher a merchant bids, the more likely his ad is to appear above other ads on the page. In this...
[ "altern slot auction design", "sponsor search", "sponsor search", "ad list", "rank by bid", "rank by revenu", "incomplet inform", "second price", "auction-style mechan", "second-price payment rule", "equilibrium multitud", "diverg of econom valu", "diverg of valu", "combin market capit", ...
[ "P", "P", "P", "P", "P", "P", "P", "P", "M", "M", "R", "R", "R", "U", "M", "M", "U", "M", "R", "M" ]
An Analysis of Alternative Slot Auction Designs for Sponsored Search S´ebastien Lahaie ∗ Division of Engineering and Applied Sciences Harvard University, Cambridge, MA 02138 slahaie@eecs.harvard.edu ABSTRACT Billions of dollars are spent each year on sponsored search, a form of advertising where merchants pay for place...
An Analysis of Alternative Slot Auction Designs for Sponsored Search ABSTRACT Billions of dollars are spent each year on sponsored search, a form of advertising where merchants pay for placement alongside web search results. Slots for ad listings are allocated via an auction-style mechanism where the higher a merchant ...
An Analysis of Alternative Slot Auction Designs for Sponsored Search ABSTRACT Billions of dollars are spent each year on sponsored search, a form of advertising where merchants pay for placement alongside web search results. Slots for ad listings are allocated via an auction-style mechanism where the higher a merchant ...
An Analysis of Alternative Slot Auction Designs for Sponsored Search ABSTRACT Billions of dollars are spent each year on sponsored search, a form of advertising where merchants pay for placement alongside web search results. Slots for ad listings are allocated via an auction-style mechanism where the higher a merchant ...
J-55
From Optimal Limited To Unlimited Supply Auctions
We investigate the class of single-round, sealed-bid auctions for a set of identical items to bidders who each desire one unit. We adopt the worst-case competitive framework defined by [9, 5] that compares the profit of an auction to that of an optimal single-price sale of least two items. In this paper, we first deriv...
[ "unlimit suppli", "auction", "ratio", "mechan design", "competit analysi", "benchmark", "aggreg auction", "bound", "prefer", "distribut" ]
[ "P", "P", "P", "U", "M", "U", "M", "U", "U", "U" ]
From Optimal Limited To Unlimited Supply Auctions Jason D. Hartline Microsoft Research 1065 La Avenida) Mountain View, CA 94043 hartline@microsoft.com Robert McGrew ∗ Computer Science Department Stanford University Stanford, CA 94305 bmcgrew@stanford.edu ABSTRACT We investigate the class of single-round, sealed-bid auc...
From Optimal Limited To Unlimited Supply Auctions ABSTRACT We investigate the class of single-round, sealed-bid auctions for a set of identical items to bidders who each desire one unit. We adopt the worst-case competitive framework defined by [9, 5] that compares the profit of an auction to that of an optimal single-p...
From Optimal Limited To Unlimited Supply Auctions ABSTRACT We investigate the class of single-round, sealed-bid auctions for a set of identical items to bidders who each desire one unit. We adopt the worst-case competitive framework defined by [9, 5] that compares the profit of an auction to that of an optimal single-p...
From Optimal Limited To Unlimited Supply Auctions ABSTRACT We investigate the class of single-round, sealed-bid auctions for a set of identical items to bidders who each desire one unit. We adopt the worst-case competitive framework defined by [9, 5] that compares the profit of an auction to that of an optimal single-p...
C-71
A Point-Distribution Index and Its Application to Sensor-Grouping in Wireless Sensor Networks
We propose ι, a novel index for evaluation of point-distribution. ι is the minimum distance between each pair of points normalized by the average distance between each pair of points. We find that a set of points that achieve a maximum value of ι result in a honeycomb structure. We propose that ι can serve as a good in...
[ "point-distribut index", "sensor-group", "wireless sensor network", "honeycomb structur", "surveil", "redund", "fault toler", "node-deduct process", "increment coverag qualiti algorithm", "sleep configur protocol", "sensor coverag", "sensor group" ]
[ "P", "P", "P", "P", "U", "U", "U", "M", "M", "U", "M", "M" ]
A Point-Distribution Index and Its Application to Sensor-Grouping in Wireless Sensor Networks Yangfan Zhou Haixuan Yang Michael R. Lyu Edith C.-H. Ngai Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong, China {yfzhou, hxyang, lyu, chngai}@cse. cuhk.edu.hk ABSTRACT We propose ι...
A Point-Distribution Index and Its Application to Sensor-Grouping in Wireless Sensor Networks ABSTRACT We propose t, a novel index for evaluation of point-distribution. t is the minimum distance between each pair of points normalized by the average distance between each pair of points. We find that a set of points that...
A Point-Distribution Index and Its Application to Sensor-Grouping in Wireless Sensor Networks ABSTRACT We propose t, a novel index for evaluation of point-distribution. t is the minimum distance between each pair of points normalized by the average distance between each pair of points. We find that a set of points that...
A Point-Distribution Index and Its Application to Sensor-Grouping in Wireless Sensor Networks ABSTRACT We propose t, a novel index for evaluation of point-distribution. t is the minimum distance between each pair of points normalized by the average distance between each pair of points. We find that a set of points that...
J-69
Robust Incentive Techniques for Peer-to-Peer Networks
Lack of cooperation (free riding) is one of the key problems that confronts today's P2P systems. What makes this problem particularly difficult is the unique set of challenges that P2P systems pose: large populations, high turnover, asymmetry of interest, collusion, zero-cost identities, and traitors. To tackle these c...
[ "incent", "p2p system", "collus", "reciproc decis function", "reput", "adapt stranger polici", "selfinterest user", "incent for cooper", "game-theoret approach", "maxflow-base algorithm", "reciproc peer", "mutual cooper", "asymmetr payoff", "generos", "paramet nomin valu", "whitewash",...
[ "P", "P", "P", "P", "P", "P", "M", "R", "U", "U", "M", "M", "U", "U", "U", "U", "R", "M", "U", "U", "U", "R" ]
Robust Incentive Techniques for Peer-to-Peer Networks Michal Feldman1 mfeldman@sims.berkeley.edu Kevin Lai2 klai@hp.com Ion Stoica3 istoica@cs.berkeley.edu John Chuang1 chuang@sims.berkeley.edu 1 School of Information Management and Systems U.C. Berkeley 2 HP Labs 3 Computer Science Division U.C. Berkeley ABSTRACT Lack...
Robust Incentive Techniques for Peer-to-Peer Networks Lack of cooperation (free riding) is one of the key problems that confronts today's P2P systems. What makes this problem particularly difficult is the unique set of challenges that P2P systems pose: large populations, high turnover, asymmetry of interest, collusion,...
Robust Incentive Techniques for Peer-to-Peer Networks Lack of cooperation (free riding) is one of the key problems that confronts today's P2P systems. What makes this problem particularly difficult is the unique set of challenges that P2P systems pose: large populations, high turnover, asymmetry of interest, collusion,...
Robust Incentive Techniques for Peer-to-Peer Networks Lack of cooperation (free riding) is one of the key problems that confronts today's P2P systems. What makes this problem particularly difficult is the unique set of challenges that P2P systems pose: large populations, high turnover, asymmetry of interest, collusion,...
I-38
Bidding Algorithms for a Distributed Combinatorial Auction
Distributed allocation and multiagent coordination problems can be solved through combinatorial auctions. However, most of the existing winner determination algorithms for combinatorial auctions are centralized. The PAUSE auction is one of a few efforts to release the auctioneer from having to do all the work (it might...
[ "bid algorithm", "combinatori auction", "distribut alloc", "coordin", "paus auction", "task and resourc alloc", "revenu-maxim solut", "combinatori optim problem", "agent", "progress adapt user select environ", "branch and bound search", "search tree", "branch-on-bid tree" ]
[ "P", "P", "P", "P", "P", "M", "M", "M", "U", "U", "M", "M", "U" ]
Bidding Algorithms for a Distributed Combinatorial Auction Benito Mendoza ∗ and Jos´e M. Vidal Computer Science and Engineering University of South Carolina Columbia, SC 29208 mendoza2@engr.sc.edu, vidal@sc.edu ABSTRACT Distributed allocation and multiagent coordination problems can be solved through combinatorial auct...
Bidding Algorithms for a Distributed Combinatorial Auction ABSTRACT Distributed allocation and multiagent coordination problems can be solved through combinatorial auctions. However, most of the existing winner determination algorithms for combinatorial auctions are centralized. The PAUSE auction is one of a few effort...
Bidding Algorithms for a Distributed Combinatorial Auction ABSTRACT Distributed allocation and multiagent coordination problems can be solved through combinatorial auctions. However, most of the existing winner determination algorithms for combinatorial auctions are centralized. The PAUSE auction is one of a few effort...
Bidding Algorithms for a Distributed Combinatorial Auction ABSTRACT Distributed allocation and multiagent coordination problems can be solved through combinatorial auctions. However, most of the existing winner determination algorithms for combinatorial auctions are centralized. The PAUSE auction is one of a few effort...