Sciweavers

1537 search results - page 225 / 308
» Deployment of Distributed Multi-agent Systems
Sort
View
CCS
2007
ACM
14 years 4 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
SIGOPSE
2004
ACM
14 years 3 months ago
QoS for internet services: done right
In this paper we argue that the best approach to providing Quality of Service (QoS) guarantees to current Internet services is to use admission control and traffic shaping techni...
Josep M. Blanquer, Antoni Batchelli, Klaus E. Scha...
ATAL
2007
Springer
14 years 2 months ago
On the benefits of cheating by self-interested agents in vehicular networks
As more and more cars are equipped with GPS and Wi-Fi transmitters, it becomes easier to design systems that will allow cars to interact autonomously with each other, e.g., regard...
Raz Lin, Sarit Kraus, Yuval Shavitt
TON
2002
123views more  TON 2002»
13 years 9 months ago
Utility-based rate control in the Internet for elastic traffic
In a communication network, a good rate allocation algorithm should reflect the utilities of the users while being fair. We investigate this fundamental problem of achieving the sy...
Richard J. La, Venkat Anantharam
OSDI
2002
ACM
14 years 10 months ago
TCP Nice: A Mechanism for Background Transfers
Many distributed applications can make use of large background transfers ? transfers of data that humans are not waiting for ? to improve availability, reliability, latency or con...
Arun Venkataramani, Ravi Kokku, Michael Dahlin