Controllable privacy preserving search based on symmetric predicate encryption in cloud storage

CI Fan, SY Huang - Future Generation Computer Systems, 2013‏ - Elsevier
Predicate encryption is a novel cryptographic primitive that provides fine-grained control
over the accesses to encrypted data. It is often used in secure cloud storage and biometric …

Token system design for autonomic wireless relay networks

J Xu, M Van Der Schaar - IEEE transactions on communications, 2013‏ - ieeexplore.ieee.org
This paper proposes a novel framework for incentivizing self-interested transceivers
operating in autonomic wireless networks to provide relaying services to other transceivers …

A token-based incentive mechanism for video streaming applications in peer-to-peer networks

R Aslani, V Hakami, M Dehghan - Multimedia Tools and Applications, 2018‏ - Springer
Free-riding is one of the main challenges of Peer-to-Peer (P2P) streaming systems which
results in reduction in video streaming quality. Therefore, providing an incentive mechanism …

Efficient online exchange via fiat money

M van der Schaar, J Xu, W Zame - Economic Theory, 2013‏ - Springer
In many online systems, individuals provide services for each other; the recipient of the
service obtains a benefit but the provider of the service incurs a cost. If benefit exceeds cost …

The wandering token: Congestion avoidance of a shared resource

A Ciuffoletti - Future Generation Computer Systems, 2010‏ - Elsevier
In a distributed system where scalability is an issue, the problem of enforcing mutual
exclusion often arises in a soft form: the infrequent failure of the mutual exclusion predicate …

Prototype implementation of a demand driven network monitoring architecture

A Ciuffoletti, Y Marchetti, A Papadogiannakis… - Grid Computing …, 2008‏ - Springer
The capability of dynamically monitoring the performance of the communication
infrastructure is one of the emerging requirements for a Grid. We claim that such a capability …

[PDF][PDF] Mihaela van der Schaar, Jie Xu &

W Zame‏ - medianetlab.ee.ucla.edu
In many online systems, individuals provide services for each other; the recipient of the
service obtains a benefit but the provider of the service incurs a cost. If benefit exceeds cost …

[PDF][PDF] End-to-end network monitoring infrastructure

A Ciuffoletti, Y Marchetti, A Papadogiannakis… - 2008‏ - academia.edu
The capability of dynamically monitoring the performance of the communication
infrastructure is one of the emerging requirements for a Grid. We claim that such a capability …

Designing incentives for wireless relay networks using tokens

J Xu, M van Der Schaar - … and Optimization in Mobile, Ad Hoc …, 2012‏ - ieeexplore.ieee.org
This paper proposes a novel system design for wireless relay networks formed of self-
interested users that relies on token exchanges. Our emphasis in this paper is on …

Designing practical distributed exchange for online communities

J Xu, M van der Schaar, W Zame - arxiv preprint arxiv:1108.5871, 2011‏ - arxiv.org
In many online systems, individuals provide services for each other; the recipient of the
service obtains a benefit but the provider of the service incurs a cost. If benefit exceeds cost …