We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
We develop a framework to study differentiated services when there are competing network providers. We adopt a multi-class queueing model, where providers post prices for various s...
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Automated agents for electricity markets, social networks, and other distributed networks must repeatedly interact with other intelligent agents, often without observing associate...
Jacob W. Crandall, Asad Ahmed, Michael A. Goodrich
In order to fully utilize scarce spectrum resources, dynamic spectrum allocation becomes a promising approach to increase the spectrum efficiency for wireless networks. However, th...