Sciweavers

222 search results - page 32 / 45
» Equilibria for Networks with Malicious Users
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints
—With the convergence of multimedia applications and wireless communications, there is an urgent need for developing new scheduling algorithms to support real-time traffic with ...
Sheu-Sheu Tan, Dong Zheng, Junshan Zhang, James R....
MOBISYS
2007
ACM
14 years 8 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
DSN
2005
IEEE
14 years 2 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
NDSS
2002
IEEE
14 years 1 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
AAAI
2006
13 years 9 months ago
Trust Representation and Aggregation in a Distributed Agent System
This paper considers a distributed system of software agents who cooperate in helping their users to find services, provided by different agents. The agents need to ensure that th...
Yonghong Wang, Munindar P. Singh