نتایج جستجو برای: selfishness

تعداد نتایج: 662  

2012
Purushottam Patel Rupali Soni

Routing is a easiest way to launch a attack in MANET due to highly dynamic topology which makes routing procedure more complicated and insecure and therefore nodes are more susceptible to compromise and are particularly vulnerable to denial of service attack (DoS) attacks launched by malicious nodes or intruders .Another challenging issue is selfishness of a node which dramatically decreases th...

2012
Emiliano Salvucci

The acceptance of Darwin's theory of evolution by natural selection is not complete and it has been pointed out its limitation to explain the complex processes that constitute the transformation of species. It is necessary to discuss the explaining power of the dominant paradigm. It is common that new discoveries bring about contradictions that are intended to be overcome by adjusting results t...

2006
Thomas Moscibroda

Large-scale and highly decentralized networks such as the Internet have emerged as arguably the most complex computer systems. The size of such networks, as well as their dynamic, socio-economic, and often wireless nature brings about a large variety of challenging problems. Achieving efficient and provably robust algorithmic solutions for these problems, in turn, necessitates the development a...

Journal: :Theor. Comput. Sci. 2009
Leah Epstein Elena Kleiman Rob van Stee

We consider a scheduling problem on m machines, where each job is controlled by a selfish agent. Each agent is only interested in minimizing its own cost, defined as the total load of the machine that its job is assigned to. We consider the objective of maximizing the minimum load (the value of the cover) over the machines. Unlike the regular makespan minimization problem, which was extensively...

2003
Pietro Michiardi

Countermeasures against node misbehavior and selfishness are mandatory requirements in mobile ad hoc networks. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. In this paper we outline an original security mechanism (CORE) based on reputation that is used to enforce cooperation among t...

2008
Yochai Benkler

The last two decades have seen significant work undermining the selfishness hypothesis commonly used as a simplifying device for analysis based on the rational actor model. The work traverses a wide range of disciplines, from experimental economics and game theory, to anthropology, social psychology, and evolutionary biology. At the same time, organizational sociology and management science hav...

2013
Shailender Gupta Chander Kumar

The security issues are more complex and challenging in Mobile Ad hoc Networks (MANETs) than other conventional wireless networks due to peer to peer behavior of the participating nodes, absence of centralized routers and routing through intermediate nodes. For successful communication between a pair of source and destination it is vital that the intermediate nodes be trustworthy and don’t drop...

2016
Shailender Gupta C. K. Nagpal V. Srinivasan P. Nuggehalli C. F. Chiasserini Yanchao Zhang Wenjing Lou Wei Liu Yuguang Fang

Mobile ad hoc network has emerged as a trending topic of research in recent years owing to the highlighted pervasive computing culture. MANETs are decentralized, and therefore all network activities are carried out by nodes themselves. Transmissions are not controlled by any central authority as like base stations in the case of cellular networks. Each node is both an end-system as well as a re...

2002
Pietro Michiardi

Countermeasures against node misbehavior and selfishness are mandatory requirements in mobile ad hoc networks. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. In this paper we outline an original security mechanism (CORE) based on reputation that is used to enforce cooperation among t...

Journal: :CoRR 2017
Brian Powers Michalis Smyrnakis Hamidou Tembine

Although the definition of what empathetic preferences exactly are is still evolving, there is a general consensus in the psychology, science and engineering communities that the evolution toward players’ behaviors in interactive decision-making problems will be accompanied by the exploitation of their empathy, sympathy, compassion, antipathy, spitefulness, selfishness, altruism, and self-abneg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید