Sciweavers

222 search results - page 17 / 45
» Equilibria for Networks with Malicious Users
Sort
View
PERCOM
2009
ACM
14 years 8 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
WOWMOM
2005
ACM
87views Multimedia» more  WOWMOM 2005»
14 years 29 days ago
Reputation Management for Collaborative Content Distribution
We propose a reputation-based trust management system, ROCQ, to reduce inauthentic and corrupted file transfers in end-user collaborative content-distribution systems. Such syste...
Anurag Garg, Roberto G. Cascella
HOTOS
2003
IEEE
14 years 21 days ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
ACSAC
2004
IEEE
13 years 11 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
INFOCOM
2007
IEEE
14 years 1 months ago
Border Games in Cellular Networks
— In each country today, cellular networks operate on carefully separated frequency bands. This careful separation is imposed by the regulators of the given country to avoid the ...
Márk Félegyházi, Mario Cagalj...