Sciweavers

14 search results - page 1 / 3
» Learning to impersonate
Sort
View
ICML
2006
IEEE
14 years 5 months ago
Learning to impersonate
Consider Alice, who is interacting with Bob. Alice and Bob have some shared secret which helps Alice identify Bob-impersonators. Now consider Eve, who knows Alice and Bob, but doe...
Moni Naor, Guy N. Rothblum
WINE
2010
Springer
143views Economy» more  WINE 2010»
13 years 2 months ago
Impersonation Strategies in Auctions
A common approach to analyzing repeated auctions, such as sponsored search auctions, is to treat them as complete information games, because it is assumed that, over time, players...
Ian A. Kash, David C. Parkes
SIGCSE
2002
ACM
167views Education» more  SIGCSE 2002»
13 years 4 months ago
Defensive climate in the computer science classroom
As part of an NSF-funded IT Workforce grant, the authors conducted ethnographic research to provide deep understanding to the learning environment of computer science classrooms. ...
Lecia Jane Barker, Kathy Garvin-Doxas, Michele H. ...
MMM
2005
Springer
108views Multimedia» more  MMM 2005»
13 years 10 months ago
Using Games As a Means for Collaboration
The availability of a good interface for online user collaboration has been a sore point for most collaboration applications to date. While MUD’s, MOO’s, IRC and other chat ap...
Keiran Bartlett, Matthew Simpson
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 4 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...