Sciweavers

619 search results - page 108 / 124
» Characterizing user behavior in online social networks
Sort
View
WWW
2008
ACM
15 years 10 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
15 years 3 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 2 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
GLOBECOM
2010
IEEE
14 years 7 months ago
Optimal Bandwidth Allocation with Dynamic Service Selection in Heterogeneous Wireless Networks
Bandwidth allocation for different service classes in heterogeneous wireless networks is an important issue for service provider in terms of balancing service quality and profit. I...
Kun Zhu, Dusit Niyato, Ping Wang