Sciweavers

73 search results - page 11 / 15
» Constructing utility models from observed negotiation action...
Sort
View
INFOCOM
2011
IEEE
12 years 10 months ago
The digital rights management game in peer-to-peer streaming systems
—In this paper we model the digital rights management (DRM) for peer-to-peer streaming (P2PS) systems as a game. We construct the DRM game from both content service provider (CSP...
Jin Zhang, Wei Lou
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
14 years 28 days ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
ENTCS
2008
64views more  ENTCS 2008»
13 years 7 months ago
General Refinement, Part Two: Flexible Refinement
In the previous, companion, paper [13] to this paper we introduced our general model of refinement, discussed ideas around determinism and interfaces that the general definition r...
Steve Reeves, David Streader
TIP
2010
127views more  TIP 2010»
13 years 5 months ago
Bayesian Compressive Sensing Using Laplace Priors
In this paper we model the components of the compressive sensing (CS) problem, i.e., the signal acquisition process, the unknown signal coefficients and the model parameters for ...
S. Derin Babacan, Rafael Molina, Aggelos K. Katsag...
EUROCRYPT
2009
Springer
14 years 8 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...