The goal of this paper is to explore the effects of synchronization on distributed decision making processes. In particular, we examine the dynamics of a spatially distributed mul...
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and effic...
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
Motivated by the growth of various networked systems as potential market places, we study market models wherein, owing to the size of the markets, transactions take place between l...
Atish Das Sarma, Deeparnab Chakrabarty, Sreenivas ...