Sciweavers

581 search results - page 92 / 117
» policy 2009
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks
Abstract— Although direct reciprocity (Tit-for-Tat) contribution systems have been successful in reducing freeloading in peerto-peer overlays, it has been shown that, unless the ...
Raul Landa, David Griffin, Richard G. Clegg, Eleni...
INFOCOM
2009
IEEE
14 years 3 months ago
Network Pricing and Rate Allocation with Content Provider Participation
Abstract—Pricing content-providers for connectivity to endusers and setting connection parameters based on the price is an evolving model on the Internet. The implications are he...
Prashanth Hande, Mung Chiang, A. Robert Calderbank...
ISDA
2009
IEEE
14 years 3 months ago
Valley-Adaptive Clearing Scheme for Multimodal Optimization Evolutionary Search
Recent studies [13, 18] have shown that clearing schemes are efficient multi-modal optimization methods. They efficiently reduce genetic drift which is the direct reason for prema...
Mostafa Mostafa Hashim Ellabaan, Yew-Soon Ong
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
WINE
2009
Springer
184views Economy» more  WINE 2009»
14 years 3 months ago
Competitive Routing over Time
Congestion games are a fundamental and widely studied model for selfish allocation problems like routing and load balancing. An intrinsic property of these games is that players ...
Martin Hoefer, Vahab S. Mirrokni, Heiko Rögli...