Sciweavers

1813 search results - page 57 / 363
» Mechanism Design on Trust Networks
Sort
View
SWS
2004
ACM
15 years 5 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
SIGECOM
2005
ACM
106views ECommerce» more  SIGECOM 2005»
15 years 5 months ago
On decentralized incentive compatible mechanisms
Algorithmic Mechanism Design focuses on Dominant Strategy Implementations. The main positive results are the celebrated Vickrey-Clarke-Groves (VCG) mechanisms and computationally ...
Ahuva Mu'alem
SOUPS
2009
ACM
15 years 6 months ago
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing
A recent trend in social networking, photo/video sharing, and location-sharing services is a demand for more expressive privacy mechanisms that provide greater control over the co...
Michael Benisch, Patrick Gage Kelley, Norman M. Sa...
LCN
2008
IEEE
15 years 6 months ago
Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
—Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path...
Christine Laurendeau, Michel Barbeau
ICPP
2000
IEEE
15 years 3 months ago
A Problem-Specific Fault-Tolerance Mechanism for Asynchronous, Distributed Systems
The idle computers on a local area, campus area, or even wide area network represent a significant computational resource--one that is, however, also unreliable, heterogeneous, an...
Adriana Iamnitchi, Ian T. Foster