نتایج جستجو برای: gambit tokens
تعداد نتایج: 5899 فیلتر نتایج به سال:
Ensuring fairness in a system with scarce, preferred resources requires time sharing. We consider a heterogeneous system with a few “big” and many “small” processors. We allocate heterogeneous processors using a novel token mechanism, which frames the allocation problem as a repeated game. At each round, users request big processors and spend a token if their request is granted. We analyze the ...
The primary purpose of this paper is to model uncertain digital objects in view of nancial risk management in an open network. We have made an abstraction of the objects and deened the security token, which is abbreviated into a word coinage setok. Each setok has its price, values, and timestamp on it as well as the main contents. Not only the price but also the values can be uncertain and may ...
Consider a team of asynchronous agents that must explore an unknown graph G in presence of a black hole, a node which destroys all incoming agents without leaving any observable trace. Interagent communication and coordination is achieved using tokens that agents can pick up, carry, and drop on the nodes. It is known that, if the agents have a map of G, the problem can be solved with a constant...
The objective of this study was to determine whether the 2004 USA Dewine-Kennedy Bill is congruent with Philip Morris' core policy principles for United States Food and Drug Administration (FDA) regulation of tobacco and what impact that would have on the public health. I compared the Dewine-Kennedy Bill with 1999 Philip Morris core policy principles for FDA regulation. Additional supporting da...
Aim The ecosystem functions and services of coral reefs are critical for coastal communities worldwide. Due to conservation resource limitation, species need be prioritized protect desirable properties biodiversity, such as functional diversity (FD), which has been associated with greater functioning but is difficult quantify directly. Selecting maximize phylogenetic (PD) shown indirectly captu...
In humans and apes, one of the most adaptive functions of symbols is to inhibit strong behavioural predispositions. However, to our knowledge, no study has yet investigated whether using symbols provides some advantage to non-ape primates. We aimed to trace the evolutionary roots of symbolic competence by examining whether tokens improve performance in the reverse-reward contingency task in cap...
The current study evaluated the effects of tokens delivered on differential reinforcement of zero-rate behavior (DRO) schedules or noncontingently on tic suppression in 4 children with tics. Tic frequency was lower in 3 of 4 children when tokens were delivered contingent on the absence of tics than when tokens were delivered noncontingently.
Given k ≥ 3 heaps of tokens. The moves of the 2-player game introduced here are to either take a positive number of tokens from at most k − 1 heaps, or to remove the same positive number of tokens from all the k heaps. We analyse this extension of Wythoff’s game and provide a polynomial-time strategy for it.
Identity management system(s) (IDMS) do rely on tokens in order to function. Tokens can contribute to privacy or security risk in IDMS. Specifically, the characteristics of tokens contribute greatly to security and privacy risks in IDMS. Our understanding of how the characteristics of token contribute to privacy and security risks will help us manage the privacy and security risks in IDMS. In t...
Given two independent sets I and J of a graph G, imagine that a token (coin) is placed on each vertex in I. Then, the Sliding Token problem asks if one could transforms I to J using a sequence of elementary steps, where each step requires sliding a token from one vertex to one of its neighbors, such that the resulting set of vertices where tokens are placed still remains independent. In this pa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید