Sciweavers

254 search results - page 34 / 51
» The Networked Common Goods Game
Sort
View
NSDI
2008
14 years 11 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
72
Voted
CCR
2008
94views more  CCR 2008»
14 years 9 months ago
ECHOS: edge capacity hosting overlays of nano data centers
In this paper we propose a radical solution to data hosting and delivery for the Internet of the future. The current data delivery architecture is "network centric", wit...
Nikolaos Laoutaris, Pablo Rodriguez, Laurent Masso...
ATAL
2007
Springer
15 years 3 months ago
An incentive mechanism for message relaying in unstructured peer-to-peer systems
Distributed message relaying is an important function of a peer-topeer system to discover service providers. Existing search protocols in unstructured peer-to-peer systems either ...
Cuihong Li, Bin Yu, Katia P. Sycara
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
15 years 3 months ago
Nonlinear dynamics modelling for controller evolution
The problem of how to acquire a model of a physical robot, which is fit for evolution of controllers that can subsequently be used to control that robot, is considered in the con...
Julian Togelius, Renzo De Nardi, Hugo Gravato Marq...
ADCOG
2004
14 years 11 months ago
Social and Ethical Considerations in Virtual Worlds
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
Robert W. Kerbs