Sciweavers

2269 search results - page 59 / 454
» Query Incentive Networks
Sort
View
ISCC
2005
IEEE
14 years 4 months ago
A Game Theoretic Analysis of Protocols Based on Fountain Codes
In this paper we analyze a novel paradigm of reliable communications which is not based on the traditional timeout-and-retransmit mechanism of TCP. Our approach, which we call FBP...
Luis López, Antonio Fernández, Vicen...
ICT
2004
Springer
110views Communications» more  ICT 2004»
14 years 4 months ago
Priority Telephony System with Pricing Alternatives
Dynamic pricing schemes in telecommunication networks were traditionally employed to create users’ incentives in such a way that the overall utilization is improved and profits a...
Saravut Yaipairoj, Fotios C. Harmantzis
ACSAC
2001
IEEE
14 years 2 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
CCGRID
2001
IEEE
14 years 2 months ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw
ICWS
2010
IEEE
14 years 19 days ago
Analyzing the Relationships between some Parameters of Web Services Reputation
In this paper, we provide an analysis of the impacts of some reputation parameters that an agent-based Web service holds while being active in the environment. To this end, we depl...
Babak Khosravifar, Jamal Bentahar, Ahmad Moazin