Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Doubl...
详细信息
ISBN:
(纸本)9781479903948
Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auction. Any auction mechanism needs to be budget balanced, Pareto optimal, individually rational, and coalition-proof. Satisfying all these properties is not so much trivial so that no multi-attribute double auction mechanism could address all these limitations. This research analyzes and compares the GM, timestamp-based and social-welfare maximization mechanisms for multiattribute double auctions. The analysis of the simulation results shows that the algorithm proposed by Gimple and Makio satisfies more properties compared to other methods for such an auction mechanism. This multi-attribute double auction mechanism is based on game theory and behaves fairer in matching and arbitration.
IR (Image Registration) is one of the important operation of image processing system which is the process of aligning two or more images into one coordinate system that are taken at different times, from different s...
详细信息
IR (Image Registration) is one of the important operation of image processing system which is the process of aligning two or more images into one coordinate system that are taken at different times, from different sensors, or from different viewpoints. It has a lot of applications especially medical imaging and remote sensing. The main purpose of this paper is to provide a comprehensive review of existing literatures available on image registration system and proposed a new feature-based IR technique using edge of images. We used edges as a feature of images for registration. It will be a useful document for researchers who will work on feature-based image registration regardless for specific applications.
In this paper, a study related to the expected performance behaviour of present 3-level cache system for multi-core systems is presented. For this a queuing model for present 3-level cache system for multi-core proces...
详细信息
In this paper, a study related to the expected performance behaviour of present 3-level cache system for multi-core systems is presented. For this a queuing model for present 3-level cache system for multi-core processors is developed and its possible performance has been analyzed with the increase in number of cores. Various important performance parameters like access time and utilization of individual cache at different level and overall average access time of the cache system is determined. Results for up to 1024 cores have been reported in this paper.
This paper investigates the performance of well known packet scheduling algorithms developed for single carrier wireless systems from a real time video streaming perspective. The performance evaluation is conducted us...
详细信息
ISBN:
(纸本)9781424455317;9781424455324
This paper investigates the performance of well known packet scheduling algorithms developed for single carrier wireless systems from a real time video streaming perspective. The performance evaluation is conducted using the downlink third generation partnership project long term evolution (3GPP LTE) system as the simulation platform. This paper contributes to the identification of a suitable packet scheduling algorithm for use in the downlink 3GPP LTE system supporting video streaming services. Simulation results show that, in the downlink 3GPP LTE system supporting video streaming services, maximum-largest weighted delay first (M-LWDF) algorithm outperforms other packet scheduling algorithms by providing a higher system throughput, supporting a higher number of users and guaranteeing fairness at a satisfactory level.
We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signatu...
详细信息
We consider the security of a steganographic (or watermarking) protocol based on blind signatures proposed by Lenti et al. at WISP 2001. We remark that it is one that is a simple modification of existing blind signature schemes where the message to be signed blindly is replaced with an image to be watermarked. In this paper, we show that the trusted third party who signs the image blindly could be falsely led by an attacker to sign an image that is entirely different from the original. Besides, another well-known attack based on the multiplicative property of the RSA also applies here.
暂无评论