Abstract—Peer-to-peer storage systems aim to provide a reliable long-term storage at low cost. In such systems, peers fail continuously, hence, the necessity of self-repairing me...
Abstract. Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and pr...
Large-scale networks of wireless sensors are becoming an active topic of research. Advances in hardware technology and engineering design have led to dramatic reductions in size, ...
Joseph M. Kahn, Randy H. Katz, Kristofer S. J. Pis...
Many applications in vehicular networks need the data to be disseminated from a source vehicle to a large number of vehicles in the network. Although many solutions to this proble...
We introduce the notion of fault tolerant mechanism design, which extends the standard game theoretic framework of mechanism design to allow for uncertainty about execution. Speci...
Ryan Porter, Amir Ronen, Yoav Shoham, Moshe Tennen...