Sciweavers

450 search results - page 57 / 90
» Games with Exhaustible Resources
Sort
View
ATAL
2009
Springer
14 years 2 months ago
The price of democracy in coalition formation
Whenever rational agents form coalitions to execute tasks, doing so via a decentralized negotiation process—while more robust and democratic—may lead to a loss of efficiency ...
Georgios Chalkiadakis, Edith Elkind, Maria Polukar...
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 8 months ago
Competition of Wireless Providers for Atomic Users
We study a problem where wireless service providers compete for heterogenous and atomic (non-infinitesimal) wireless users. The users differ in their utility functions as well as ...
Vojislav Gajic, Jianwei Huang, Bixio Rimoldi
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 2 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
PRDC
2008
IEEE
14 years 2 months ago
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability)
Multiserver operating systems have great potential to improve dependability, but, paradoxically, are paired with inherently more complex interprocess communication (IPC). Several ...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...