Search
Now showing items 21-30 of 65
Risk Allocation for Multi-agent Systems using Tatonnement
(2009-04-22)
This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty, called MIRA (Market-based Iterative Risk Allocation). In large coordination problems, from power grid management ...
Oblivious Routing in On-Chip Bandwidth-Adaptive Networks
(2009-03-27)
Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex ...
Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit State Model Checking
(2009-03-26)
Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact the usability of web applications. Current tools for web-page validation cannot handle the dynamically generated ...
Understanding and evaluating blind deconvolution algorithms
(2009-03-31)
Blind deconvolution is the recovery of a sharp version of a blurred image when the blur kernel is unknown. Recent algorithms have afforded dramatic progress, yet many aspects of the problem remain challenging and hard to ...
Computing Network Coordinates in the Presence of Byzantine Faults
(2009-04-16)
Network coordinate systems allow for efficient construction of large-scale distributed systems on the Internet. Coordinates provide locality information in a compact way, without requiring each node to contact every potential ...
Representing Small Group Evolution
(2009-03-30)
Understanding the dynamics of network evolution rests in part on the representation chosen to characterize the evolutionary process. We offer a simple, three-parameter representation based on subgraphs that capture three ...
Understanding and Supporting Directed Content Sharing on the Web
(2009-10-07)
To find interesting, personally relevant web content, we often rely on friends and colleagues to pass links along as they encounter them. In this paper, we study and augment link-sharing via e-mail, the most popular means ...
A Bayesian inference theory of attention: neuroscience and algorithms
(2009-10-03)
The past four decades of research in visual neuroscience has generated a large and disparate body of literature on the role of attention [Itti et al., 2005]. Although several models have been developed to describe specific ...
Whanaungatanga: Sybil-proof routing with social networks
(2009-09-24)
Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...
Efficient POMDP Forward Search by Predicting the Posterior Belief Distribution
(2009-09-23)
Online, forward-search techniques have demonstrated promising results for solving problems in partially observable environments. These techniques depend on the ability to efficiently search and evaluate the set of beliefs ...