Sciweavers

2269 search results - page 23 / 454
» Query Incentive Networks
Sort
View
MADNES
2005
Springer
14 years 1 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
DBISP2P
2004
Springer
95views Database» more  DBISP2P 2004»
14 years 1 months ago
Data Management in Mobile Peer-to-Peer Networks
Abstract. In this paper we examine the database management of spatiotemporal resource information in mobile peer-to-peer networks, where moving objects communicate with each other ...
Bo Xu, Ouri Wolfson
NETCOOP
2009
Springer
14 years 2 months ago
Understanding and Preventing Tacit Collusion among Telecommunication Operators
Abstract. Modeling the competition among telecommunication operators (or providers) as a repeated game may explain why tacit collusion to maintain high charging prices can be obser...
Patrick Maillé, Maurizio Naldi, Bruno Tuffi...
CCR
2010
105views more  CCR 2010»
13 years 7 months ago
Fostering IPv6 migration through network quality differentials
This paper develops a simple model that explores the extent to which differences in connectivity quality can be effective incentives (or disincentives) towards migrating to an IPv...
Roch Guérin, Kartik Hosanagar
CISS
2008
IEEE
14 years 2 months ago
On flat-rate and usage-based pricing for tiered commodity internet services
In this note, we discuss issues pertaining to end-to-end qualityof-service management of commodity Internet applications and associated pricing incentive mechanisms. The issue of ...
George Kesidis, A. Das, Gustavo de Veciana