Sciweavers

1653 search results - page 202 / 331
» Computer science and game theory
Sort
View
OTM
2007
Springer
15 years 5 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
86
Voted
ACMICEC
2006
ACM
152views ECommerce» more  ACMICEC 2006»
15 years 4 months ago
Capacity allocation with competitive retailers
This paper addresses a problem in supply chain management that how scarce resources can be efficiently allocated among competing interests. We present a formal model of allocation...
Masabumi Furuhata, Dongmo Zhang
99
Voted
FCT
1999
Springer
15 years 3 months ago
On Recognizable Languages in Divisibility Monoids
Kleene’s theorem on recognizable languages in free monoids is considered to be of eminent importance in theoretical computer science. It has been generalized into various directi...
Manfred Droste, Dietrich Kuske
94
Voted
WISEC
2010
ACM
15 years 5 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
LICS
2006
IEEE
15 years 4 months ago
A Congruence Rule Format for Name-Passing Process Calculi from Mathematical Structural Operational Semantics
d Abstract) Marcelo Fiore∗ and Sam Staton† Computer Laboratory, University of Cambridge We introduce a mathematical structural operational semantics that yields a congruence r...
Marcelo P. Fiore, Sam Staton