Computing optimal strategies to commit to in general normal-form or Bayesian games is a topic that has recently been gaining attention, in part due to the application of such algo...
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
Due to the widespread appearance of filesharing systems like Napster, the peer-to-peer concept has recently become well known. So far, these file-sharing systems have been used fo...
Abstract. In this paper, we describe a scenario for a distributed marketplace on the Web where resource discovery agents find out about resources that may want to join the marketpl...
Asuman Dogac, Ilker Durusoy, Sena Nural Arpinar, E...