Sciweavers

2299 search results - page 348 / 460
» A Class of Hypercube-Like Networks
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 11 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
GECCO
2008
Springer
156views Optimization» more  GECCO 2008»
13 years 11 months ago
Computing minimum cuts by randomized search heuristics
We study the minimum s-t-cut problem in graphs with costs on the edges in the context of evolutionary algorithms. Minimum cut problems belong to the class of basic network optimiz...
Frank Neumann, Joachim Reichel, Martin Skutella
CCS
2010
ACM
13 years 10 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
CN
2006
111views more  CN 2006»
13 years 10 months ago
Analytical modeling of CAC in next generation wireless systems
Though Connection Admission Control (CAC) in wireless networks has been studied extensively, the heterogeneous structure of Next Generation Wireless Systems (NGWS) makes CAC very ...
Tuna Tugcu, H. Birkan Yilmaz, Feodor S. Vainstein
COMCOM
2006
140views more  COMCOM 2006»
13 years 10 months ago
A combined delay and throughput proportional scheduling scheme for differentiated services
Abstract--The proportional differentiation model is a newly introduced approach for differentiated services networks. This paper proposes and evaluates a scheduling mechanism for t...
Ahmed E. Kamal, Samyukta Sankaran