Sciweavers

537 search results - page 20 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
COMPCON
1995
IEEE
15 years 2 months ago
NetBill: An Internet Commerce System Optimized for Network Delivered Services
Netbill is a business model, set of protocols, and software implementation for commerce in information goods and other network delivered services. It has very low transaction cost...
Marvin A. Sirbu, J. D. Tygar
WIMOB
2008
IEEE
15 years 5 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 2 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
105
Voted
NETWORKING
2007
15 years 2 days ago
The TCP Minimum RTO Revisited
We re-examine the two reasons for the conservative 1-second Minimum TCP-RTO to protect against spurious timeouts: i) the OS clock granularity and ii) the Delayed ACKs. We find tha...
Ioannis Psaras, Vassilis Tsaoussidis
CCS
2010
ACM
14 years 9 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim