Sciweavers

2951 search results - page 542 / 591
» Secure Distributed DNS
Sort
View
IOR
2008
148views more  IOR 2008»
15 years 2 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...
98
Voted
IPL
2008
72views more  IPL 2008»
15 years 2 months ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
JCS
2008
69views more  JCS 2008»
15 years 2 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
CORR
2007
Springer
107views Education» more  CORR 2007»
15 years 2 months ago
Risk Minimization and Optimal Derivative Design in a Principal Agent Game
We consider the problem of Adverse Selection and optimal derivative design within a Principal-Agent framework. The principal’s income is exposed to non-hedgeable risk factors ar...
U. Horst, S. Moreno
126
Voted
JMM2
2006
149views more  JMM2 2006»
15 years 2 months ago
Invariant Robust 3-D Face Recognition based on the Hilbert Transform in Spectral Space
One of the main objectives of face recognition is to determine whether an acquired face belongs to a reference database and to subsequently identify the corresponding individual. F...
Eric Paquet, Marc Rioux