Sciweavers

507 search results - page 23 / 102
» Defensive Marketing Strategies
Sort
View
SIGECOM
2011
ACM
259views ECommerce» more  SIGECOM 2011»
12 years 10 months ago
Designing adaptive trading agents
ended abstract summarizes the research presented in Dr. Pardoe’s recently-completed Ph.D. thesis [Pardoe 2011]. The thesis considers how adaptive trading agents can take advantag...
David Pardoe, Peter Stone
APIN
2004
87views more  APIN 2004»
13 years 7 months ago
Supply Estimation Using Coevolutionary Genetic Algorithms in the Spanish Electrical Market
The price of electrical energy in Spain has not been regulated by the government since 1998, but determined by the supply from the generators in a competitive market, the so-called...
Enrique A. de la Cal Marín, Luciano S&aacut...
ICASSP
2011
IEEE
12 years 11 months ago
Malicious data attack on real-time electricity market
Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Liyan Jia, Robert J. Thomas, Lang Tong
INFOCOM
2009
IEEE
14 years 2 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
CCS
2003
ACM
14 years 27 days ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld