• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,302
Next 10 →

Collaborative Location Privacy with Rational Users

by Francisco Santos, Mathias Humbert, Reza Shokri, Jean-pierre Hubaux
"... Abstract. Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with their current coordinates. However, LBS providers collect a significant amount of data from mobile users and coul ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
, instead of connecting to the LBS. However, such a solution will only function if users are willing to share regional data obtained from the LBS provider. We model this collaborative location-data sharing problem with rational agents following threshold strategies. Initially, we study agent cooperation

Studying rational user behavior in WCDMA network and its effect on network revenue*

by Yufeng Wang, Wendong Wang
"... Abstract. In WCDMA networks, most economic-based resource management algorithms only assumed that network users were obedient, that is, users only accepted the price declared by network, which is called as price acceptation mechanism. Many research issues argued that it is necessary to accommodate, ..."
Abstract - Add to MetaCart
Abstract. In WCDMA networks, most economic-based resource management algorithms only assumed that network users were obedient, that is, users only accepted the price declared by network, which is called as price acceptation mechanism. Many research issues argued that it is necessary to accommodate

RatFish: A File Sharing Protocol Provably Secure Against Rational Users

by Michael Backes, Oana Ciobotaru, Anton Krohmer
"... Abstract. The proliferation of P2P computing has recently been pro-pelled by popular applications, most notably file sharing protocols such as BitTorrent. These protocols provide remarkable efficiency and scala-bility, as well as adaptivity to dynamic situations. However, none of them is secure agai ..."
Abstract - Add to MetaCart
against attacks from rational users, i.e., users that misuse the protocol if doing so increases their benefits (e.g., reduces download time or amount of upload capacity). We propose a rigorous model of rational file sharing for both seeders and leechers, building upon the concept of rational cryptography

Describing the uncertainties in experimental results

by Robert J. Moffat - Experimental Thermal and Fluid Science , 1998
"... I I It is no longer acceptable, in most circles, to present experimental results without describing the uncertainties involved. Besides its obvious role in pub-lishing, uncertainty analysis provides the experimenter a rational way of eval-uating the significance of the scatter on repeated trials. Th ..."
Abstract - Cited by 281 (2 self) - Add to MetaCart
I I It is no longer acceptable, in most circles, to present experimental results without describing the uncertainties involved. Besides its obvious role in pub-lishing, uncertainty analysis provides the experimenter a rational way of eval-uating the significance of the scatter on repeated trials

The Impact of User Rationality in Federated Clouds

by Marian Mihailescu, Yong Meng Teo
"... With cloud computing, the long-envisioned dream of computing as utility is achieved. Many of the current standalone cloud providers offer resources and services using pay-per-use fixed pricing. Spot pricing, recently introduced in Amazon EC2, is more efficient by setting the resource price dynamical ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
and reliability, rational users can have a greater impact. In this paper, we evaluate the impact of rationality in a federated cloud, by comparing the consumer welfare achieved by spot pricing, currently used in Amazon EC2, and a strategy-proof pricing scheme. We consider different EC2 regions as providers in a

Reasoning about beliefs and actions under computational resource constraints

by Eric J. Horvitz - in Proceedings of the 1989 Workshop on Uncertainty and AI , 1987
"... Although many investigators arm a desire to build reasoning systems that behave consistently with the axiomatic basis dened by probability theory and utility theory, limited resources for engineering and computation can make a complete normative anal-ysis impossible. We attempt to move discussion be ..."
Abstract - Cited by 219 (22 self) - Add to MetaCart
alternative approximation procedures and heuristics for computation and knowledge acquisition. We discuss how knowledge about the structure of user utility can be used to control value tradeos for tailoring inference to alternative contexts. We address the notion of real-time rationality, focusing

Rationality and Self-Interest in Peer to Peer Networks

by Jeffrey Shneidman, David C. Parkes - IN 2ND INT. WORKSHOP ON PEER-TO-PEER SYSTEMS (IPTPS’03) , 2003
"... Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user's ability to modify the behavior of an algorithm for self-interested reasons. ..."
Abstract - Cited by 99 (9 self) - Add to MetaCart
Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user's ability to modify the behavior of an algorithm for self-interested reasons.

Cooperation in wireless ad hoc networks

by Vikram Srinivasan, Pavan Nuggehalli, Carla F. Chiasserini, Ramesh R. Rao - In Proceedings of the 22nd INFOCOM , 2003
"... Abstract — In wireless ad hoc networks, nodes communicate with far off destinations using intermediate nodes as relays. Since wireless nodes are energy constrained, it may not be in the best interest of a node to always accept relay requests. On the other hand, if all nodes decide not to expend ener ..."
Abstract - Cited by 172 (0 self) - Add to MetaCart
energy in relaying, then network throughput will drop dramatically. Both these extreme scenarios (complete cooperation and complete noncooperation) are inimical to the interests of a user. In this paper we address the issue of user cooperation in ad hoc networks. We assume that nodes are rational, i

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users

by Cormac Herley
"... It is often suggested that users are hopelessly lazy and unmotivated on security questions. They chose weak passwords, ignore security warnings, and are oblivious to certificates errors. We argue that users ’ rejection of the security advice they receive is entirely rational from an economic perspec ..."
Abstract - Cited by 45 (1 self) - Add to MetaCart
It is often suggested that users are hopelessly lazy and unmotivated on security questions. They chose weak passwords, ignore security warnings, and are oblivious to certificates errors. We argue that users ’ rejection of the security advice they receive is entirely rational from an economic

Brief Announcement: Sustaining Collaboration in Multicast despite Rational Collusion

by Haifeng Yu, Phillip B. Gibbons, Chenwei Shi - In PODC , 2011
"... This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational users collude or launch sybil attacks. To overcome this key limitation, we propose a novel decentralized DCast multicast ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational users collude or launch sybil attacks. To overcome this key limitation, we propose a novel decentralized DCast
Next 10 →
Results 1 - 10 of 1,302
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University