This paper describes simulations designed to test the relative efficiency of two different sequential auction mechanisms for allocating compute resources between users in a shared...
— One way to combat P2P file sharing of copyrighted content is to deposit into the file sharing systems large volumes of polluted files. Without taking sides in the file shar...
The tagging technique has been widely applied in existing Web 2.0 systems, where users label resources with tags for effective classification and efficient retrieval of resource...
Yueguo Chen, Su Chen, Yu Gu, Mei Hui, Feng Li, Che...
We consider the problem of Object Safety: how objects endowed with processing, communication, and sensing capabilities can determine their safety. We assign an agent to each objec...
Abstract. As a developing P2P system, Gnutella has upgraded its protocol to 0.6, which significantly changed the characteristics of its hosts. However, few previous work has given ...