Sciweavers

1426 search results - page 166 / 286
» A theory of goal-oriented communication
Sort
View
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 7 months ago
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures
Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by...
Guido Schryen
IAT
2006
IEEE
15 years 7 months ago
Realising Common Knowledge Assumptions in Agent Auctions
Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are commo...
Frank Guerin, Emmanuel M. Tadjouddine
INFOCOM
2006
IEEE
15 years 7 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
INFOCOM
2006
IEEE
15 years 7 months ago
Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms
— Studying transfer opportunities between wireless devices carried by humans, we observe that the distribution of the inter-contact time, that is the time gap separating two cont...
Augustin Chaintreau, Pan Hui, Jon Crowcroft, Chris...
99
Voted
NOMS
2006
IEEE
15 years 7 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath