نتایج جستجو برای: cost of exploitation
تعداد نتایج: 21186035 فیلتر نتایج به سال:
Currently, the best known algorithm for factorizing modulus of the RSA public key cryptosystem is the Number Field Sieve. One of its important phases usually combines a sieving technique and a method for checking smoothness of mid-size numbers. For this factorization, the Elliptic Curve Method (ECM) is an attractive solution. As ECM is highly regular and many parallel computations are required,...
We consider a wireless system with multiple channels when each channel has several transmission states. A user learns about the instantaneous state of an available channel by transmitting a control packet in it. In presence of multiple channels, this process of probing every channel to find the best one consumes significant energy and time. So a user needs to select a channel based only on part...
We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of strategies that explore sequentially the arms. The strategies are assessed in terms of their simple regrets, a regret notion that captures the fact that exploration is only constrained by the number of available rounds (not necessarily known in advance), in contrast to the case whe...
We study the disclosure decision and price-setting behavior of competing firms in the presence of cursed consumers, who fail to be sufficiently skeptical about a firm’s quality upon observing non-disclosure of quality-relevant information. We show that neither competition nor the presence of sophisticated consumers necessarily offer protection to cursed consumers. Exploitation arises if markets...
abstract from 165 millions cubic meters of water which is used in kalat region, 60 millions cubic meters is surface water and 105 millions cubic meters is underground water. most of water needed in this region, is provided by the rivers. there is not any problem for providing water in agricultural section, drinking water and hygiene sections in the region. the most important problem in the regi...
This paper presents a framework allowing to tune continual exploration in an optimal way. It first quantifies the rate of exploration by defining the degree of exploration of a state as the probability-distribution entropy for choosing an admissible action. Then, the exploration/exploitation tradeoff is stated as a global optimization problem: find the exploration strategy that minimizes the ex...
Due to its lightweight encoder architecture, the Distributed Video Coding (DVC) concept has been seen as an attractive alternative to its conventional counterparts for a number of applications. Exceptionally low computational complexity has been achieved by moving redundancy exploitation to the decoder. However, going against this norm, redundancy exploitation techniques such as DCT transform a...
Many natural resources can be effectively exploited mainly by using capital-intensive technologies. We develop a bargaining model with endogenous inside and outside options to analyze the interactions between local communities having at least some degree of informal claims over natural resources and external agents, particularly firms interested in commercial resource exploitation. We analyze t...
Multiple classifier systems are currently the focus of intense research. In this conceptual approach, the main effort focuses on establishing decision on the basis of a set of individual classifiers’ outputs. This approach is well known but usually most of propositions do not take exploitation cost of such a classifier under consideration. The paper deals with the problem how to take a test acq...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید