Sciweavers

3130 search results - page 39 / 626
» Collusion without communication
Sort
View
INFOCOM
2010
IEEE
14 years 10 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
GECCO
2005
Springer
174views Optimization» more  GECCO 2005»
15 years 5 months ago
Emergence of communication in competitive multi-agent systems: a pareto multi-objective approach
In this paper we investigate the emergence of communication in competitive multi-agent systems. A competitive environment is created with two teams of agents competing in an explo...
Michelle McPartland, Stefano Nolfi, Hussein A. Abb...
PPOPP
2011
ACM
14 years 2 months ago
ScalaExtrap: trace-based communication extrapolation for spmd programs
Performance modeling for scientific applications is important for assessing potential application performance and systems procurement in high-performance computing (HPC). Recent ...
Xing Wu, Frank Mueller
INFOCOM
2011
IEEE
14 years 3 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...
INFOCOM
2005
IEEE
15 years 5 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou