Sciweavers

441 search results - page 79 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
TWC
2008
120views more  TWC 2008»
14 years 11 months ago
A cartel maintenance framework to enforce cooperation in wireless networks with selfish users
Abstract-- In distributed wireless networks without centralized control, each user is its own authority to maximize its own performance. This distributed characteristic provides th...
Zhu Han, Zhu Ji, K. J. Ray Liu
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 3 months ago
Collective response of human populations to large-scale emergencies
Despite recent advances in uncovering the quantitative features of stationary human activity patterns, many applications, from pandemic prediction to emergency response, require a...
James P. Bagrow, Dashun Wang, Albert-Lászl&...
ATAL
2007
Springer
15 years 5 months ago
Commitment and extortion
Making commitments, e.g., through promises and threats, enables a player to exploit the strengths of his own strategic position as well as the weaknesses of that of his opponents....
Paul Harrenstein, Felix Brandt, Felix A. Fischer
EUROSYS
2010
ACM
15 years 4 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
ATAL
2008
Springer
15 years 1 months ago
Copeland voting: ties matter
We study the complexity of manipulation for a family of election systems derived from Copeland voting via introducing a parameter that describes how ties in head-to-head contests...
Piotr Faliszewski, Edith Hemaspaandra, Henning Sch...