Reputation in Self-Organized Communication Systems and Beyond (Invited Paper)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The paper considers the problem of detecting cyber-attacks occurring in communication networks for distributed control schemes. A distributed methodology is proposed to detect the presence of malicious attacks aimed at compromising the stability of large-s ...
In this work and the supporting Parts II and III of this paper, also in the current issue, we provide a rather detailed analysis of the stability and performance of asynchronous strategies for solving distributed optimization and adaptation problems over n ...
Institute of Electrical and Electronics Engineers2015
Waiting time in any network is often a costly and hence a bad experience. Therefore, to avoid jamming regions becomes essential in the optimization of traffic flows. In this regard, the conception and the control of complex networks supporting flows of uni ...
Social network has extended its popularity from the Internet to mobile domain. Personal mobile devices can be self-organized and communicate with each other for instant social activities at any time and in any places to achieve pervasive social networking ...
Finding theoretical limits on the performance of communication systems and designing schemes to achieve them is one of the fundamental questions in information theory. While the theory of point-to-point communication is well-investigated, most problems hav ...
A Mobile Ad Hoc Network (MANET) is becoming a practical platform for pervasive social networking. For example, people chat with each other via MANET for instant social activities. How to help mobile users build up trust in pervasive social chatting is beco ...
Reputation systems help users evaluate information quality and incentivize civilized behavior, often by tallying feedback from other users such as "likes" or votes and linking these scores to a user’s long-term identity. This identity linkage enables user ...
Reputation is a well established means to determine trustworthiness in online systems in various contexts, e.g. online transactions, product recommendation, e-mail spam fighting, etc. However, typically these reputation systems are "closed" outside of the ...
The classical problem in network coding theory considers communication over multicast networks. Multiple transmitters send independent messages to multiple receivers which decode the same set of messages. In this work, computation over multicast networks i ...
We consider the polling problem in a social network where participants care about their reputation: they do not want their vote to be disclosed nor their misbehaving, if any, to be publicly exposed. Assuming this reputation concern, we show that a simple s ...