Sciweavers

3483 search results - page 671 / 697
» Forward
Sort
View
SYNTHESE
2008
99views more  SYNTHESE 2008»
14 years 9 months ago
Gavagai again
Quine (1960, ch.2) claims that there are a variety of equally good schemes for translating or interpreting ordinary talk. `Rabbit' might be taken to divide its reference over...
John Robert Gareth Williams
78
Voted
IJSN
2007
129views more  IJSN 2007»
14 years 9 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
TC
2008
14 years 9 months ago
Improving Quality of VoIP Streams over WiMax
Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are ...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly
88
Voted
TEC
2008
127views more  TEC 2008»
14 years 9 months ago
Fingerprinting: Visualization and Automatic Analysis of Prisoner's Dilemma Strategies
Fingerprinting is a technique for generating a representation-independent functional signature for a game playing agent. Fingerprints can be used to compare agents across represent...
Daniel A. Ashlock, Eun-Youn Kim
88
Voted
TIFS
2008
149views more  TIFS 2008»
14 years 9 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu