-
1
-
-
11244252132
-
-
I. Aad, J.-P. Hubaux, E.W. Knightly, Denial of service resilience in Ad Hoc Networks, in: Proceedings of ACM Mobicom, 2004
-
I. Aad, J.-P. Hubaux, E.W. Knightly, Denial of service resilience in Ad Hoc Networks, in: Proceedings of ACM Mobicom, 2004
-
-
-
-
2
-
-
0035747559
-
-
K. Aberer, Z. Despotovic, Managing trust in a Peer-2-Peer information system, in: Proceedings of the Ninth International Conference on Information and Knowledge Management, CIKM, 2001
-
K. Aberer, Z. Despotovic, Managing trust in a Peer-2-Peer information system, in: Proceedings of the Ninth International Conference on Information and Knowledge Management, CIKM, 2001
-
-
-
-
3
-
-
38749153354
-
The complex facets of reputation and trust
-
Computational Intelligence, Theory and Applications, Springer
-
Aberer K., Despotovic Z., Galuba W., and Kellerer W. The complex facets of reputation and trust. Computational Intelligence, Theory and Applications. Advances in Soft Computing (2006), Springer 283-294
-
(2006)
Advances in Soft Computing
, pp. 283-294
-
-
Aberer, K.1
Despotovic, Z.2
Galuba, W.3
Kellerer, W.4
-
4
-
-
0036220942
-
Giving according to GARP: An experimental test of the consistency of preferences for altruism
-
Andreoni J., and Miller J.H. Giving according to GARP: An experimental test of the consistency of preferences for altruism. Econometrica 70 (2002) 737-753
-
(2002)
Econometrica
, vol.70
, pp. 737-753
-
-
Andreoni, J.1
Miller, J.H.2
-
5
-
-
84943746732
-
-
P. Antoniadis, C. Courcoubetis, E. Efstathiou, G. Polyzos, B. Strulo, Peer-to-Peer wireless LAN consortia: Economic modeling and architecture, in: Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing, P2P 2003, 2003
-
P. Antoniadis, C. Courcoubetis, E. Efstathiou, G. Polyzos, B. Strulo, Peer-to-Peer wireless LAN consortia: Economic modeling and architecture, in: Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing, P2P 2003, 2003
-
-
-
-
7
-
-
38749153714
-
-
S. Bansal, M. Baker, Observation-based cooperation enforcement in Ad Hoc Networks, Technical report. Arxiv preprint cs.NI/0307012, 2003
-
S. Bansal, M. Baker, Observation-based cooperation enforcement in Ad Hoc Networks, Technical report. Arxiv preprint cs.NI/0307012, 2003
-
-
-
-
8
-
-
0242696192
-
-
S. Buchegger, J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in dynamic Ad-Hoc Networks, in: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC. IEEE, 2002
-
S. Buchegger, J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in dynamic Ad-Hoc Networks, in: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC. IEEE, 2002
-
-
-
-
9
-
-
38749136399
-
-
S. Buchegger, J.-Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile Ad-Hoc Networks, in: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003
-
S. Buchegger, J.-Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile Ad-Hoc Networks, in: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003
-
-
-
-
10
-
-
24744432675
-
Self-policing mobile Ad Hoc Networks by reputation systems
-
Buchegger S., and Le Boudec J.-Y. Self-policing mobile Ad Hoc Networks by reputation systems. IEEE Communications Magazine 43 7 (2005) 101-107
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
11
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile Ad Hoc Networks
-
Buttyán L., and Hubaux J.-P. Stimulating cooperation in self-organizing mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications 8 5 (2003) 579-592
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
14
-
-
38749135972
-
-
C. Courcoubetis, R.R. Weber, Asymptotics for provisioning problems of peering wireless LANs with a large number of participants, in: Proceedings of WiOpt 2004: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2004
-
C. Courcoubetis, R.R. Weber, Asymptotics for provisioning problems of peering wireless LANs with a large number of participants, in: Proceedings of WiOpt 2004: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2004
-
-
-
-
16
-
-
38749132634
-
-
J.G. Dai, Stability of fluid and stochastic processing networks, Author's class notes, 1999
-
J.G. Dai, Stability of fluid and stochastic processing networks, Author's class notes, 1999
-
-
-
-
18
-
-
84947273682
-
The Sybil Attack
-
Peer-to-Peer Systems: First International Workshop, IPTPS 2002, Springer, Berlin, Heidelberg
-
Douceur J.R. The Sybil Attack. Peer-to-Peer Systems: First International Workshop, IPTPS 2002. 2002 of Lecture Notes in Computer Science vol. 2429 (2002), Springer, Berlin, Heidelberg 251-260
-
(2002)
2002 of Lecture Notes in Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
23
-
-
4544283175
-
-
Q. He, D. Wu, P. Khosla, SORI: a secure and objective reputation-based incentive scheme for Ad Hoc Networks, in: IEEE Wireless Communications and Neworking Conference, WCNC 2004, March 2004
-
Q. He, D. Wu, P. Khosla, SORI: a secure and objective reputation-based incentive scheme for Ad Hoc Networks, in: IEEE Wireless Communications and Neworking Conference, WCNC 2004, March 2004
-
-
-
-
24
-
-
38749090315
-
-
Y. Hu, D. Johnson, D. Maltz, The dynamic source routing protocol for mobile Ad Hoc Networks (DSR). http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt, July 2004
-
Y. Hu, D. Johnson, D. Maltz, The dynamic source routing protocol for mobile Ad Hoc Networks (DSR). http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt, July 2004
-
-
-
-
25
-
-
84880467894
-
-
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in P2P networks, in: Proceedings of the Twelfth International World Wide Web Conference 2003, 2003
-
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in P2P networks, in: Proceedings of the Twelfth International World Wide Web Conference 2003, 2003
-
-
-
-
26
-
-
85128534881
-
-
W. Kang, F.P. Kelly, N.H. Lee, R.J. Williams, Fluid and Brownian approximations for an Internet congestion control model, in: Proceedings of the 43rd IEEE Conference on Decision and Control, 2004
-
W. Kang, F.P. Kelly, N.H. Lee, R.J. Williams, Fluid and Brownian approximations for an Internet congestion control model, in: Proceedings of the 43rd IEEE Conference on Decision and Control, 2004
-
-
-
-
28
-
-
84901408225
-
-
J. Kim, P.J. Bentley, Towards an articial immune system for network intrusion detection: An investigation of dynamic clonal selection, in: Congress on Evolutionary Computation, CEC-2002, 2002, pp. 1015-1020
-
J. Kim, P.J. Bentley, Towards an articial immune system for network intrusion detection: An investigation of dynamic clonal selection, in: Congress on Evolutionary Computation, CEC-2002, 2002, pp. 1015-1020
-
-
-
-
30
-
-
29844453615
-
Using partial differential equations to model TCP mice and elephants in large IP networks
-
Marsan M.A., Garetto M., Giaccone P., Leonardi E., Schiattarella E., and Tarello A. Using partial differential equations to model TCP mice and elephants in large IP networks. IEEE/ACM Transactions on Networking 13 6 (2005) 1289-1301
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.6
, pp. 1289-1301
-
-
Marsan, M.A.1
Garetto, M.2
Giaccone, P.3
Leonardi, E.4
Schiattarella, E.5
Tarello, A.6
-
31
-
-
85177503368
-
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile Ad Hoc Networks, in: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM, Boston, 2000
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile Ad Hoc Networks, in: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM, Boston, 2000
-
-
-
-
32
-
-
34250786051
-
Manifesto for the reputation society
-
Masum H., and Zhang Y.-C. Manifesto for the reputation society. First Monday 9 7 (2004)
-
(2004)
First Monday
, vol.9
, Issue.7
-
-
Masum, H.1
Zhang, Y.-C.2
-
33
-
-
0031599142
-
Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator
-
Matsumoto M., and Nishimura T. Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modelling and Computer Simulation 8 1 (1998) 3-30
-
(1998)
ACM Transactions on Modelling and Computer Simulation
, vol.8
, Issue.1
, pp. 3-30
-
-
Matsumoto, M.1
Nishimura, T.2
-
34
-
-
38749085038
-
-
P. Michiardi, R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks, in: Proceedings of the Sixth IFIP Communication and Multimedia Security Conference 2002, 2002
-
P. Michiardi, R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks, in: Proceedings of the Sixth IFIP Communication and Multimedia Security Conference 2002, 2002
-
-
-
-
35
-
-
25844515285
-
Eliciting informative feedback: The peer-prediction Method
-
Miller N., Resnick P., and Zeckhauser R. Eliciting informative feedback: The peer-prediction Method. Management Science 51 (2005) 1359-1373
-
(2005)
Management Science
, vol.51
, pp. 1359-1373
-
-
Miller, N.1
Resnick, P.2
Zeckhauser, R.3
-
36
-
-
38749117662
-
-
V. Misra, W. Gong, D. Towsley, A Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED, in: Proceedings of ACM SIGCOMM 2000, 2000
-
V. Misra, W. Gong, D. Towsley, A Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED, in: Proceedings of ACM SIGCOMM 2000, 2000
-
-
-
-
37
-
-
38749106320
-
-
T. Moreton, A. Twigg, Enforcing collaboration in peer-to-peer routing services, in: Proceedings of the First International Conference on Trust Management, 2003
-
T. Moreton, A. Twigg, Enforcing collaboration in peer-to-peer routing services, in: Proceedings of the First International Conference on Trust Management, 2003
-
-
-
-
38
-
-
33744470567
-
-
J. Mundinger, J.-Y. Le Boudec, Analysis of a reputation system for mobile Ad-Hoc Networks with liars, in: Proceedings of WiOpt 2005: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2005, pp. 41-46
-
J. Mundinger, J.-Y. Le Boudec, Analysis of a reputation system for mobile Ad-Hoc Networks with liars, in: Proceedings of WiOpt 2005: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2005, pp. 41-46
-
-
-
-
39
-
-
26844455344
-
Analysis of a robust reputation system for self-organised networks (Self-Organisation in Mobile Networking)
-
(special issue)
-
Mundinger J., and Le Boudec J.-Y. Analysis of a robust reputation system for self-organised networks (Self-Organisation in Mobile Networking). European Transactions on Telecommunications 16 5 (2005) 375-384 (special issue)
-
(2005)
European Transactions on Telecommunications
, vol.16
, Issue.5
, pp. 375-384
-
-
Mundinger, J.1
Le Boudec, J.-Y.2
-
40
-
-
38749104837
-
-
J. Mundinger, J.-Y. Le Boudec, The impact of liars on reputation in social networks, in: Proceedings of Social Network Analysis: Advances and Empirical Applications Forum, Oxford, UK, 2005
-
J. Mundinger, J.-Y. Le Boudec, The impact of liars on reputation in social networks, in: Proceedings of Social Network Analysis: Advances and Empirical Applications Forum, Oxford, UK, 2005
-
-
-
-
42
-
-
0002101577
-
Reputation systems: Facilitating trust in internet interactions
-
Resnick P., Zeckhauser R., Friedman E., and Kuwabara K. Reputation systems: Facilitating trust in internet interactions. Communications of the ACM 43 12 (2000) 45-48
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
43
-
-
85006210403
-
Review on computation trust and reputation models
-
Sabater J., and Sierra C. Review on computation trust and reputation models. Artificial Intelligence Review 24 (2005) 33-60
-
(2005)
Artificial Intelligence Review
, vol.24
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
44
-
-
38749153695
-
An artificial immune system for misbehavior detection in mobile Ad-Hoc Networks with virtual thymus, clustering, danger signal and memory detectors
-
Sarafijanovic S., and Le Boudec J.-Y. An artificial immune system for misbehavior detection in mobile Ad-Hoc Networks with virtual thymus, clustering, danger signal and memory detectors. International Journal of Unconventional Computing 1 (2005) 221-254
-
(2005)
International Journal of Unconventional Computing
, vol.1
, pp. 221-254
-
-
Sarafijanovic, S.1
Le Boudec, J.-Y.2
-
46
-
-
0001199625
-
Dobrushin's mean-field approximation for a queue with dynamic routing
-
Suhov Y.M., and Vvedenskaya N.D. Dobrushin's mean-field approximation for a queue with dynamic routing. Markov Processes and Related Fields 3 4 (1997) 493-526
-
(1997)
Markov Processes and Related Fields
, vol.3
, Issue.4
, pp. 493-526
-
-
Suhov, Y.M.1
Vvedenskaya, N.D.2
-
47
-
-
38749115543
-
-
A. Whitby, A. Jösang, J. Indulska, Filtering out unfair ratings in bayesian reputation systems, in: Third International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS'04, 2004
-
A. Whitby, A. Jösang, J. Indulska, Filtering out unfair ratings in bayesian reputation systems, in: Third International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS'04, 2004
-
-
-
-
50
-
-
1142293052
-
-
B. Yu, M. Singh, Detecting deception in reputation management, in: Second International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS'03, 2003
-
B. Yu, M. Singh, Detecting deception in reputation management, in: Second International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS'03, 2003
-
-
-
|