Sciweavers

148 search results - page 14 / 30
» Security Games with Incomplete Information
Sort
View
TMM
2002
133views more  TMM 2002»
13 years 6 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
ALGORITHMICA
2010
152views more  ALGORITHMICA 2010»
13 years 7 months ago
Gaming Prediction Markets: Equilibrium Strategies with a Market Maker
We study the equilibrium behavior of informed traders interacting with market scoring rule (MSR) market makers. One attractive feature of MSR is that it is myopically incentive com...
Yiling Chen, Stanko Dimitrov, Rahul Sami, Daniel M...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 8 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
WINE
2009
Springer
121views Economy» more  WINE 2009»
14 years 1 months ago
Gaming Dynamic Parimutuel Markets
We study the strategic behavior of risk-neutral non-myopic agents in Dynamic Parimutuel Markets (DPM). In a DPM, agents buy or sell shares of contracts, whose future payoff in a p...
Qianya Lin, Yiling Chen
EEE
2004
IEEE
13 years 10 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee