Sciweavers

1087 search results - page 170 / 218
» Dynamics in congestion games
Sort
View
ICIP
2008
IEEE
14 years 10 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
I3D
2010
ACM
14 years 6 months ago
Cascaded Light Propagation Volumes for Real-Time Indirect Illumination
This paper introduces a new scalable technique for approximating indirect illumination in fully dynamic scenes for real-time applications, such as video games. We use lattices and...
Anton Kaplanyan, Carsten Dachsbacher
SMC
2007
IEEE
137views Control Systems» more  SMC 2007»
14 years 3 months ago
Cooperative mixed strategy for service selection in service oriented architecture
—In Service Oriented Architecture (SOA), service brokers could find many service providers which offer same function with different quality of service (QoS). Under this condition...
Yimin Shen, Yushun Fan
OTM
2007
Springer
14 years 2 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
WIOPT
2006
IEEE
14 years 2 months ago
Reverse engineering MAC
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Ao Tang, Jang-Won Lee, Jianwei Huang, Mung Chiang,...