Filters








4,180 Hits in 12.1 sec

When Security Games Hit Traffic: Optimal Traffic Enforcement Under One Sided Uncertainty

Ariel Rosenfeld, Sarit Kraus
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
Efficient traffic enforcement is an essential, yet complex, component in preventing road accidents.  ...  In this paper, we present a novel model and an optimizing algorithm for mitigating some of the computational challenges of real-world traffic enforcement allocation in large road networks.  ...  Acknowledgment This work was supported in part by the LAW-TRAIN project that has received funding from the European Union Horizon 2020 research and innovation program under grant agreement 653587 and in  ... 
doi:10.24963/ijcai.2017/533 dblp:conf/ijcai/RosenfeldK17 fatcat:l5sycogs3jefxowro7mprnorpi

Computational Air Traffic Management

Marc Anthony Azzopardi, James F. Whidborne
2011 2011 IEEE/AIAA 30th Digital Avionics Systems Conference  
The traffic density using such a system can be realistically increased many times higher than current levels while significantly improving on the current levels of safety, operating cost, environmental  ...  The level of air traffic has greatly exceeded the wildest expectations of the air traffic management pioneers that originally defined the basic precepts ATM that persist till today.  ...  on results drawn from Economic/Game Theory.  ... 
doi:10.1109/dasc.2011.6095967 fatcat:5kfu6ba5h5g7pdffh7z3ftdjai

An orchestration approach for unwanted Internet traffic identification

Eduardo Feitosa, Eduardo Souto, Djamel H. Sadok
2012 Computer Networks  
It focuses on solving problems and modeling uncertainty when using purely probabilistic methods.  ...  The initial results of this procedure detection are encouraging indeed when taking into account the high hit ratio for both large and even low rate illegitimate traffic.  ... 
doi:10.1016/j.comnet.2012.04.018 fatcat:2aeso6gfq5dmhixzfzpjo7jrwm

Large-Scale Mobile Traffic Analysis: A Survey

Diala Naboulsi, Marco Fiore, Stephane Ribot, Razvan Stanica
2016 IEEE Communications Surveys and Tutorials  
Our approach provides a complete introductory guide to the research based on mobile traffic analysis.  ...  When detailing the works pertaining to each class, we balance a comprehensive view of state-ofthe-art results with punctual focuses on the methodological aspects.  ...  On the spatial side, Lambiotte et al.  ... 
doi:10.1109/comst.2015.2491361 fatcat:2an7rvsbknehbh2xekbwlpka74

Pedestrians, Autonomous Vehicles, and Cities

Adam Millard-Ball
2016 Journal of planning education and research  
In this paper, I use game theory to analyze the interactions between pedestrians and autonomous vehicles, with a focus on yielding at crosswalks.  ...  At the same time, autonomous vehicle adoption may be hampered by their strategic disadvantage that slows them down in urban traffic.  ...  Acknowledgments I thank Chris Barrington-Leigh, Rachel Weinberger and Mark Massoud, as well as the editor and three anonymous reviewers, for brainstorming initial ideas and for helpful comments on a draft  ... 
doi:10.1177/0739456x16675674 fatcat:7ygy5nk4fjcg5he3nyc7tjqdki

Could firewall rules be public - a game theoretical perspective

Qi Liao, Zhen Li, Aaron Striegel
2011 Security and Communication Networks  
The equilibrium under multiple-network game is socially optimal because the percentage of required lying firewalls in social optimum is much smaller than the percentage in single-network equilibrium and  ...  Traditionally, the rules of the firewall are kept private under the assumption that privacy of the ruleset makes attacks on the network more difficult.  ...  when multiple networks play the game rather than just one network.  ... 
doi:10.1002/sec.307 fatcat:vz3bsemj7bej3fs3cevxoi576i

A Survey of Anticipatory Mobile Networking: Context-Based Classification, Prediction Methodologies, and Optimization Techniques [article]

Nicola Bui, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, Joerg Widmer
2017 arXiv   pre-print
Anticipatory networking extends the idea to communication technologies by studying patterns and periodicity in human behavior and network dynamics to optimize network performance.  ...  In particular, we identify the main prediction and optimization tools adopted in this body of work and link them with objectives and constraints of the typical applications and scenarios.  ...  under uncertainty: For the video optimization use case, some works also assess the impact of uncertain predictions.  ... 
arXiv:1606.00191v3 fatcat:me4ufu7gsjcmtcrs3m6g4jf2am

Governance Institutions and Economic Activity

Avinash Dixit
2009 The American Economic Review  
Because of the delay, they were caught in the cold of the late autumn on the way back, and perished.  ...  Scott, by contrast, relied on his own ideas and a belief that everything British, and specifically everything previously done by the British navy, was the best. The results were starkly different.  ...  For one-sided dilemmas, this is essentially an "efficiency wage" idea: the second mover should get enough surplus from each stage game to exceed the annuity he would get by investing the one-time gain  ... 
doi:10.1257/aer.99.1.5 fatcat:fh7iznk7hrfkjgp76zw2hrrite

A Survey of Anticipatory Mobile Networking: Context-Based Classification, Prediction Methodologies, and Optimization Techniques

Nicola Bui, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, Joerg Widmer
2017 IEEE Communications Surveys and Tutorials  
In particular, we iden-10 tify the main prediction and optimization tools adopted in this 11 body of work and link them with objectives and constraints of the 12 typical applications and scenarios.  ...  presence in today's digital transactions. 4 Anticipatory networking extends the idea to communication tech-5 nologies by studying patterns and periodicity in human behavior 6 and network dynamics to optimize  ...  Under Uncertainty: For the video 686 optimization use case, some works also assess the impact of 687 uncertain predictions.  ... 
doi:10.1109/comst.2017.2694140 fatcat:xdpdceqnwfgprdlpmbeuhufl4u

Game Theoretic Approaches in Vehicular Networks: A Survey [article]

Zemin Sun, Yanheng Liu, Jian Wang, Carie Anil, Dongpu Cao
2020 arXiv   pre-print
traffic, ubiquitous access to information, and various applications.  ...  Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of  ...  The players in a cooperate game should agree on an enforceable agreement before starting the game.  ... 
arXiv:2006.00992v1 fatcat:lljjlitvlvbvhbg3aot5xszefm

Cognitive Capacity Harvesting Networks: Architectural Evolution Toward Future Cognitive Radio Networks

Haichuan Ding, Yuguang Fang, Xiaoxia Huang, Miao Pan, Pan Li, Savo Glisic
2017 IEEE Communications Surveys and Tutorials  
One pressing and fundamental problem is how to integrate cognitive radios into current wireless networks to enhance network capacity and improve users' experience.  ...  this tutorial, we systematically summarize the principles for CRN architecture design and present a novel flexible network architecture, termed cognitive capacity harvesting network (CCHN), to elaborate on  ...  Apart from these issues, current per-user based schemes will experience difficulties in FCC rule enforcement and bill collection, particularly when online auctions are on the scale of minutes with costs  ... 
doi:10.1109/comst.2017.2677082 fatcat:cujzxnqpfbagreyrfjmg6oryru

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures

Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, Zhili Sun
2018 IEEE Internet of Things Journal  
Location privacy is one of the major challenges in vehicular and mobile networks. In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks.  ...  LBS provide users with relevant information based on their location. In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected.  ...  However, they still point out some issues concerning the specification and enforcement of security and privacy constraints on location-based information.  ... 
doi:10.1109/jiot.2018.2820039 fatcat:y2gdcllac5fbpdd2nnxn4tib2i

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies [article]

Mark Scanlon
2017 arXiv   pre-print
A proof of concept tool was developed for conducting investigations on the BitTorrent network.  ...  This project is focused on study of active P2P nodes along with the analysis of the undocumented communication methods employed in many of these large unstructured networks.  ...  ACKNOWLEDGEMENTS With no doubt, the work on this thesis has been the most challenging endeavour I have undertaken so far. I am thankful to my supervisor, Prof.  ... 
arXiv:1712.03455v1 fatcat:brkwhni6vza2dm7ristaj5gyoa

Babel

John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek
2012 Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12  
Babel can work perfectly well alongside existing systems, and opens new markets for security.  ...  The user gets continuous protection, and multiple kinds of protection, with no need for security updates or patches.  ...  Servers could add in code, that is run on the client side, to check and enforce data access restrictions on the client; the server can be a remote reference monitor [1] , in a sense, that emits code to  ... 
doi:10.1145/2381913.2381922 dblp:conf/ccs/AycockCLJ12 fatcat:n3uusvujkbfnxa3cc7h7rp6bd4

Collaboration Planning of Stakeholders for Sustainable City Logistics Operations [article]

Taiwo Adetiloye
2021 arXiv   pre-print
The importance of city logistics is growing over the years especially with its role in minimizing traffic congestion and freeing up of public space for city residents.  ...  the collaboration strategies of stakeholders for achieving sustainable city logistics operations attainable under non-chaotic situation and presumptions of human levity tendency.  ...  logistics and efficiency under congested urban traffic conditions.  ... 
arXiv:2107.14049v1 fatcat:33czst2f4jdlpjgy32juvj7bwu
« Previous Showing results 1 — 15 out of 4,180 results