#### Filter Results:

- Full text PDF available (23)

#### Publication Year

2005

2017

- This year (1)
- Last 5 years (13)
- Last 10 years (25)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Thomas E. Carroll, Daniel Grosu
- 2009 Proceedings of 18th International Conference…
- 2009

We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling… (More)

- Daniel Grosu, Thomas E. Carroll
- The 4th International Symposium on Parallel and…
- 2005

An important scheduling problem is the one in which there are no dependencies between tasks and the tasks can be of arbitrary size. This is known as the divisible load scheduling problem and was studied extensively resulting in a cohesive theory called divisible load theory (DLT). In this paper, we augment the existing divisible load theory with incentives.… (More)

- Thomas E. Carroll, Daniel Grosu
- IEEE Transactions on Parallel and Distributed…
- 2008

The scheduling of arbitrarily divisible loads on a distributed system is studied by Divisible Load Theory (DLT). DLT has the underlying assumption that the processors will not cheat. In the real world, this assumption is unrealistic as the processors are owned and operated by autonomous rational organizations that have no a priori motivation for… (More)

- Thomas E. Carroll, Daniel Grosu
- 2006 Fifth International Symposium on Parallel…
- 2006

In this paper we formulate and study a new scheduling problem called selfish multi-user task scheduling. This problem assumes that there are several users, each of them having multiple tasks that need processing on a set of parallel identical machines. Each user is selfish and her goal is to minimize the makespan of her own tasks. We model this problem as a… (More)

- Thomas E. Carroll, Daniel Grosu
- Concurrency and Computation: Practice and…
- 2010

Applications require the composition of resources to execute in a grid computing environment. The Grid Service Providers (GSPs), the owners of the computational resources, must form Virtual Organizations (VOs) to be able to provide the composite resource. We consider grids as self-organizing systems composed of autonomous, selfinterested GSPs that will… (More)

- Thomas E. Carroll, Daniel Grosu
- 2010 39th International Conference on Parallel…
- 2010

We consider the online scheduling of malleable jobs on parallel systems, such as clusters, symmetric multiprocessing computers, and multi-core processor computers. Malleable jobs is a model of parallel processing in which jobs adapt to the number of processors assigned to them. This model permits the scheduler and resource manager to make more efficient use… (More)

Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses. Although limited testing has demonstrated it to be effective, little research has been conducted to examine the theoretical limits of address shuffling. As a result, it is difficult to understand how… (More)

- Thomas E. Carroll, Daniel Grosu
- 8th International Symposium on Parallel…
- 2005

In a classical mechanism design setting the outcome of the mechanism is computed by a trusted central party. In this paper we consider distributed implementations in which the outcome is computed by the agents themselves. We propose a distributed mechanism for solving the problem of scheduling on unrelated machines. This mechanism, called distributed… (More)

- Thomas E. Carroll, Daniel Grosu
- International Conference on Information…
- 2005

We propose an electronic voting (e-voting) scheme that combines user-centric mix networks with voter-verifiable receipts. Unlike traditional mixnet-based e-voting schemes, our scheme empowers voters; the voters themselves decide the degree of anonymity required. Voters requiring a greater degree of anonymity obtain it by performing several protocol… (More)

- Thomas E. Carroll, Daniel Grosu
- J. Network and Computer Applications
- 2009

Despite the massive improvements in technology the goal of having accurate, anonymous and voter-verifiable elections has not yet been realized. The existing electronic voting schemes that provide secret voter-verifiable receipts are based on ‘classical’ mix-nets. These mix-nets approaches do not scale well and are designed to provide a fixed degree of… (More)