Sciweavers

1154 search results - page 231 / 231
» Making Self-organizing Systems Secure
Sort
View
JSAC
2007
189views more  JSAC 2007»
13 years 9 months ago
Non-Cooperative Power Control for Wireless Ad Hoc Networks with Repeated Games
— One of the distinctive features in a wireless ad hoc network is lack of any central controller or single point of authority, in which each node/link then makes its own decision...
Chengnian Long, Qian Zhang, Bo Li, Huilong Yang, X...
IOR
2010
169views more  IOR 2010»
13 years 8 months ago
Dynamic Supplier Contracts Under Asymmetric Inventory Information
In this paper, we examine a supply chain in which a single supplier sells to a downstream retailer. We consider a multi-period model, with the following sequence of events. In per...
Hao Zhang, Mahesh Nagarajan, Greys Sosic
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 4 months ago
Data Cleaning and Query Answering with Matching Dependencies and Matching Functions
Matching dependencies were recently introduced as declarative rules for data cleaning and entity resolution. Enforcing a matching dependency on a database instance identifies the ...
Leopoldo E. Bertossi, Solmaz Kolahi, Laks V. S. La...
IMC
2006
ACM
14 years 3 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan