Sciweavers

728 search results - page 117 / 146
» Bargaining with incomplete information
Sort
View
JSAC
2008
95views more  JSAC 2008»
13 years 7 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
JCM
2006
104views more  JCM 2006»
13 years 7 months ago
CLog: Low Cost Gigabit Full Packet Logging
Abstract-- Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet l...
Chad D. Mano, Jeff Smith, Bill Bordogna, Andrew Ma...
MKTSCI
2008
68views more  MKTSCI 2008»
13 years 7 months ago
Supermarket Pricing Strategies
Most supermarket firms choose to position themselves by offering either "Every Day Low Prices" (EDLP) across several items or offering temporary price reductions (promot...
Paul B. Ellickson, Sanjog Misra
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 7 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
BMCBI
2005
114views more  BMCBI 2005»
13 years 7 months ago
Quality determination and the repair of poor quality spots in array experiments
Background: A common feature of microarray experiments is the occurence of missing gene expression data. These missing values occur for a variety of reasons, in particular, becaus...
Brian D. M. Tom, Walter R. Gilks, Elizabeth T. Bro...