2013
DOI: 10.1016/j.future.2012.12.008
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative stalking of transient nomadic resources on overlay networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Our homogeneous artificial system has two virtual elements: a group of wandering thieves (in game theory: the actors) and a set of virtual diamonds or vdiamonds (in game theory: the resources). At start, each node is artificially endowed with vdiamonds which are nomadic, reusable and non-replicable virtual resources, generalizing and virtualizing the concept from 12 , 24 . Likewise, each node is endowed with wandering thieves, mobile actors which act stochastic (they wander in search of vdiamonds to steal) and egoistic (as soon as they have an opportunity, they steal vdiamonds and take them back to their home node).…”
Section: Resultsmentioning
confidence: 99%
“…Our homogeneous artificial system has two virtual elements: a group of wandering thieves (in game theory: the actors) and a set of virtual diamonds or vdiamonds (in game theory: the resources). At start, each node is artificially endowed with vdiamonds which are nomadic, reusable and non-replicable virtual resources, generalizing and virtualizing the concept from 12 , 24 . Likewise, each node is endowed with wandering thieves, mobile actors which act stochastic (they wander in search of vdiamonds to steal) and egoistic (as soon as they have an opportunity, they steal vdiamonds and take them back to their home node).…”
Section: Resultsmentioning
confidence: 99%
“…Trail decay mechanisms slow down the unlearning process in case of fast changes in the network. Based on this observation, DIP [14] and Stalkers [15] have proposed decentralized foraging algorithms relying on the previous explorations. Stalkers have used nomadic reusable non-replicable resources which migrate from node to node when released and requested.…”
Section: Swarm Intelligencementioning
confidence: 99%