CSAIL Digital Archive: Recent submissions
Now showing items 334-336 of 807
-
Whanaungatanga: Sybil-proof routing with social networks
(2009-09-24)Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ... -
Finding aircraft collision-avoidance strategies using policy search methods
(2009-09-12)A progress report describing the application of policy gradient and policy search by dynamic programming methods to an aircraft collision avoidance problem inspired by the requirements of next-generation TCAS. -
Code for LOLCAT Method (Variant of Gillespie Algorithm)
(2009-09-04)This code and data is publicly listed code for the LOLCAT Method developed by Sagar Indurkhya and Jacob Beal, in the paper: "Reaction factoring and bipartite update graphs accelerate the Gillespie algorithm for large-scale ...

