Sciweavers

394 search results - page 59 / 79
» Game theoretic models for detecting network intrusions
Sort
View
TCOM
2008
82views more  TCOM 2008»
13 years 7 months ago
Detecting the number of signals in wireless DS-CDMA networks
In this paper, a new information theoretic algorithm is proposed for signal enumeration in DS-CDMA networks. The approach is based on the predictive description length (PDL) of the...
Shahrokh Valaee, Shahram Shahbazpanahi
P2P
2007
IEEE
146views Communications» more  P2P 2007»
14 years 1 months ago
Modelling Real P2P Networks: The Effect of Altruism
We develop a model of the interaction of rational peers in an incentive-free Peer-to-Peer (P2P) network and use game theoretic analysis to derive results about peer and network be...
Dimitrios K. Vassilakis, Vasilis Vassalos
CANDC
2009
ACM
13 years 11 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
WISTP
2007
Springer
14 years 1 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
FOCS
2006
IEEE
14 years 1 months ago
Strategic Network Formation through Peering and Service Agreements
We introduce a game theoretic model of network formation in an effort to understand the complex system of business relationships between various Internet entities (e.g., Autonomou...
Elliot Anshelevich, F. Bruce Shepherd, Gordon T. W...