Public-key cryptography
Journal of the ACM (JACM)
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Communications of the ACM
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Artificial Immune Systems: A New Computational Intelligence Paradigm
Artificial Immune Systems: A New Computational Intelligence Paradigm
Everything Provable is Provable in Zero-Knowledge
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
How Do We Evaluate Artificial Immune Systems?
Evolutionary Computation
Foundations of Cryptography: Volume 1
Foundations of Cryptography: Volume 1
Proceedings of the 1982 conference on Cryptography
An analysis of the different components of the anthocnet routing algorithm
ANTS'06 Proceedings of the 5th international conference on Ant Colony Optimization and Swarm Intelligence
Proceedings of the 4th international conference on Artificial Immune Systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Hi-index | 0.00 |
This paper presents a protocol to eliminate the necessity for human moderators in forums, thus automatising the moderation process. The protocol uses a bio-inspired approach: well- and ill-behaving posters are modelled as healthy and infected cells of a living organism. Moderators are modelled as leukocytes that remove infected cells. The identification of infected cells is supported by a feedback mechanism that allows posters to rate both other posters and the performance of the moderators. To achieve an adaptive moderation, an artificial lymphatic system, modifies the group of moderators with the aim of improving the immune response when needed. This paper focuses on ad hoc wireless networks, however the modifications needed to port the protocol to a wireless network using infrastructure mode are described. To evaluate the performance of the protocol, the outcome of a simulation of the forum is presented.