Sciweavers

1100 search results - page 119 / 220
» Exertion in networked games
Sort
View
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 8 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
82
Voted
ICIP
2008
IEEE
15 years 7 months ago
Fairness dynamics in multimedia colluders' social networks
Multimedia social network analysis is a research area with growing importance, in which the social network members share multimedia contents with all different purposes and analyz...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
IPPS
2007
IEEE
15 years 7 months ago
Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm
In this paper we address the problem of selfish behavior in ad hoc networks. We propose a strategy driven approach which aims at enforcing cooperation between network participant...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
92
Voted
SIGECOM
2008
ACM
126views ECommerce» more  SIGECOM 2008»
15 years 18 days ago
Behavioral experiments in networked trade
We report on an extensive series of highly controlled human subject experiments in networked trade. Our point of departure is a simple and well-studied bipartite network exchange ...
J. Stephen Judd, Michael Kearns
93
Voted
CORR
2006
Springer
110views Education» more  CORR 2006»
15 years 21 days ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja