Location-aware systems are typically deployed on a small scale and evaluated technically, in terms of absolute errors. In this paper, the authors present their experience of deplo...
We study the effect of information overload on user engagement in an asymmetric social network like Twitter. We introduce simple game-theoretic models that capture rate competition...
Christian Borgs, Jennifer T. Chayes, Brian Karrer,...
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
— Scheduling in a Broadcast (BC) channel based on partial Channel State Information at the Transmitter (CSIT) is carried out in an opportunistic way, where several orthogonal bea...
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...