Sciweavers

4794 search results - page 151 / 959
» Trust-Based Mechanism Design
Sort
View
WICOMM
2008
83views more  WICOMM 2008»
15 years 3 months ago
iPTT: peer-to-peer push-to-talk for VoIP
This paper proposes iPTT, a peer-to-peer Push-to-Talk (PTT) service for Voice over IP (VoIP). In iPTT, a distributed and mobile-operator independent network architecture is presen...
Jiun-Ren Lin, Ai-Chun Pang, Yung-Chi Wang
125
Voted
LAWEB
2005
IEEE
15 years 9 months ago
Web Development Evolution: The Assimilation of Web Engineering Security
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security iss...
William Bradley Glisson, Ray Welland
120
Voted
SIGECOM
2003
ACM
124views ECommerce» more  SIGECOM 2003»
15 years 9 months ago
Coalitional games on graphs: core structure, substitutes and frugality
We study mechanisms that can be modelled as coalitional games with transferable utilities, and apply ideas from mechanism design and game theory to problems arising in a network d...
Rahul Garg, Vijay Kumar, Atri Rudra, Akshat Verma
133
Voted
WETICE
1999
IEEE
15 years 8 months ago
A Hierarchical Proxy Architecture for Internet-Scale Event Services
The rapid growth of the Web has made it possible to build collaborative applications on an unprecedented scale. However, the request-reply interaction model of HTTP limits the rang...
Haobo Yu, Deborah Estrin, Ramesh Govindan
158
Voted
RULES
1995
Springer
120views Database» more  RULES 1995»
15 years 7 months ago
Temporized and Localized Rule Sets
Constraint management plays an important role in design applications where constraints re ect design restrictions and design decisions. ECA rules are a widely used mechanism to enf...
Rose Sturm, Jutta A. Mülle, Peter C. Lockeman...