Now showing items 334-336 of 807

    • Whanaungatanga: Sybil-proof routing with social networks 

      Lesniewski-Laas, Chris; Kaashoek, M. Frans (2009-09-24)
      Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed ...
    • Finding aircraft collision-avoidance strategies using policy search methods 

      Kaelbling, Leslie Pack; Lozano-Perez, Tomas (2009-09-12)
      A progress report describing the application of policy gradient and policy search by dynamic programming methods to an aircraft collision avoidance problem inspired by the requirements of next-generation TCAS.
    • Code for LOLCAT Method (Variant of Gillespie Algorithm) 

      Beal, Jacob; Indurkhya, Sagar (2009-09-04)
      This code and data is publicly listed code for the LOLCAT Method developed by Sagar Indurkhya and Jacob Beal, in the paper: "Reaction factoring and bipartite update graphs accelerate the Gillespie algorithm for large-scale ...