We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
On-line routing algorithms deal with requests as they arrive without assuming any knowledge of the underlying process that generates the streams of requests. By contrast, off-line...
The development of distributed applications is rapidly growing and some applications, like those which manipulate graphics, images and sounds, need special care. In this paper, we ...
— A practical pricing mechanism is the foundation for the deploying of IP multicast in the inter-domain Internet. The IP multicast service model and its pricing mechanism are dis...
Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages by essen...