Sciweavers

225 search results - page 37 / 45
» Privacy-enhanced social network routing in opportunistic net...
Sort
View
74
Voted
CHI
2009
ACM
15 years 10 months ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
ISAAC
2003
Springer
97views Algorithms» more  ISAAC 2003»
15 years 2 months ago
Equilibria for Networks with Malicious Users
We consider the problem of characterizing user equilibria and optimal solutions for selfish routing in a given network. We extend the known models by considering malicious behavio...
George Karakostas, Anastasios Viglas
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
15 years 3 months ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
ESA
2007
Springer
153views Algorithms» more  ESA 2007»
15 years 1 months ago
Tradeoffs and Average-Case Equilibria in Selfish Routing
We consider the price of selfish routing in terms of tradeoffs and from an average-case perspective. Each player in a network game seeks to send a message with a certain length by...
Martin Hoefer, Alexander Souza
PERCOM
2006
ACM
15 years 9 months ago
Efficient Data Harvesting in Mobile Sensor Platforms
In this paper we study the use of vehicles as sensors in a "vehicular sensor network," a new network paradigm that is critical for gathering valuable information in urba...
Uichin Lee, Eugenio Magistretti, Biao Zhou, Mario ...