Consider Alice, who is interacting with Bob. Alice and Bob have some shared secret which helps Alice identify Bob-impersonators. Now consider Eve, who knows Alice and Bob, but doe...
A common approach to analyzing repeated auctions, such as sponsored search auctions, is to treat them as complete information games, because it is assumed that, over time, players...
As part of an NSF-funded IT Workforce grant, the authors conducted ethnographic research to provide deep understanding to the learning environment of computer science classrooms. ...
Lecia Jane Barker, Kathy Garvin-Doxas, Michele H. ...
The availability of a good interface for online user collaboration has been a sore point for most collaboration applications to date. While MUD’s, MOO’s, IRC and other chat ap...
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...