Sciweavers

114 search results - page 23 / 23
» Threshold Models for Competitive Influence in Social Network...
Sort
View
IDTRUST
2009
ACM
13 years 11 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
ATAL
2003
Springer
13 years 10 months ago
Resource allocation games with changing resource capacities
In this paper we study a class of resource allocation games which are inspired by the El Farol Bar problem. We consider a system of competitive agents that have to choose between ...
Aram Galstyan, Shashikiran Kolar, Kristina Lerman
ATAL
2010
Springer
13 years 6 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat
ACMICEC
2007
ACM
148views ECommerce» more  ACMICEC 2007»
13 years 9 months ago
Pricing digital content with DRM mechanism
The Internet and file sharing technology (such as P2P network) significantly alleviate the content distribution cost. However, better digital content distribution also means that ...
Yung-Ming Li, Chia-Hao Lin