Sciweavers

18 search results - page 2 / 4
» A Simple Characterization of Strategic Behaviors in Broadcas...
Sort
View
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
Matthias Fitzi, Stefan Wolf, Jürg Wullschlege...
INFOCOM
2010
IEEE
13 years 3 months ago
Cross-layer Optimization for Wireless Networks with Deterministic Channel Models
Abstract—Existing work on cross-layer optimization for wireless networks adopts simple physical-layer models, i.e., treating interference as noise. In this paper, we adopt a dete...
Ziyu Shao, Minghua Chen, Salman Avestimehr, Shuo-Y...
WINE
2007
Springer
140views Economy» more  WINE 2007»
13 years 11 months ago
Empirical Price Modeling for Sponsored Search
We present a characterization of empirical price data from sponsored search auctions. We show that simple models drawing bid values independently from a fixed distribution can be...
Kuzman Ganchev, Alex Kulesza, Jinsong Tan, Ryan Ga...
TWC
2008
130views more  TWC 2008»
13 years 5 months ago
On myopic sensing for multi-channel opportunistic access: structure, optimality, and performance
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and statistically identical Markov chains (the Gilbert-Elli...
Qing Zhao, Bhaskar Krishnamachari, Keqin Liu
GLOBECOM
2008
IEEE
13 years 11 months ago
Cooperative and Non-Cooperative Aloha Games with Channel Capture
—Game theory has been a useful tool for the analysis of random-access based wireless networks due to their decentralized operations. This paper studies one of the most widely use...
Younggeun Cho, Fouad A. Tobagi