— The maturing domain of ad hoc networking still holds some major challenges on its way to commercial exploitation. The dynamic and decentralized nature of ad hoc networks calls ...
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
- The emergence of middleware solutions and new services even on small devices will need adapted distributed management solutions which address these specificities, both in terms o...
The need to understand dynamic behavior in auctions is increasing with the popularization of online auctions. Applications include designing auction mechanisms, bidding strategies...
We initiate the study of markets for private data, through the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a t...