Sciweavers

14347 search results - page 2671 / 2870
» Interactive Granular Computing
Sort
View
IEEESP
2010
99views more  IEEESP 2010»
15 years 1 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
IJAMC
2010
149views more  IJAMC 2010»
15 years 1 months ago
Deadline-Driven Auctions for NPC host allocation in P2P MMOGs
: This paper presents the design, implementation and evaluation of Deadline-Driven Auctions (DDA), a novel task mapping infrastructure for heterogeneous distributed environments. D...
Lu Fan, Philip W. Trinder, Hamish Taylor
INFOCOM
2010
IEEE
15 years 1 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
INFOCOM
2010
IEEE
15 years 1 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
ISOLA
2010
Springer
15 years 1 months ago
Towards an Architecture for Runtime Interoperability
Abstract. Interoperability remains a fundamental challenge when connecting heterogeneous systems which encounter and spontaneously communicate with one another in pervasive computi...
Amel Bennaceur, Gordon S. Blair, Franck Chauvel, G...
« Prev « First page 2671 / 2870 Last » Next »