Sciweavers

283 search results - page 31 / 57
» Incentive Networks
Sort
View
IFIPTM
2009
127views Management» more  IFIPTM 2009»
13 years 5 months ago
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy
Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization...
Camilo H. Viecco, L. Jean Camp
WINE
2007
Springer
182views Economy» more  WINE 2007»
14 years 1 months ago
Mechanism Design on Trust Networks
We introduce the concept of a trust network—a decentralized payment infrastructure in which payments are routed as IOUs between trusted entities. The trust network has directed ...
Arpita Ghosh, Mohammad Mahdian, Daniel M. Reeves, ...
PERCOM
2011
ACM
12 years 11 months ago
Market mechanisms for Value of Information driven resource allocation in Sensor Networks
—This paper examines the possible uses of different market mechanisms for resource allocation at different levels of Wireless Sensor Network (WSN) architecture. The goal is to ma...
Boleslaw K. Szymanski, S. Yousaf Shah, Sahin Cem G...
INFOSECCD
2006
ACM
14 years 1 months ago
Campus-wide spyware and virus removal as a method of teaching information security
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university’s network u...
Frank H. Katz
SIGCOMM
2005
ACM
14 years 1 months ago
Towards an evolvable internet architecture
There is widespread agreement on the need for architectural change in the Internet, but very few believe that current ISPs will ever effect such changes. In this paper we ask what...
Sylvia Ratnasamy, Scott Shenker, Steven McCanne