Sciweavers

4022 search results - page 73 / 805
» Adaptive Sweeping Techniques
Sort
View
IDTRUST
2010
ACM
14 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
ICC
2008
IEEE
123views Communications» more  ICC 2008»
14 years 4 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
KSEM
2007
Springer
14 years 4 months ago
Knowledge Engineering Technique for Cluster Development
After the concept of industry cluster was tangibly applied in many countries, SMEs trended to link to each other to maintain their competitiveness in the market. The major key succ...
Pradorn Sureephong, Nopasit Chakpitak, Yacine Ouzr...
SKG
2006
IEEE
14 years 4 months ago
Remote Memory Management and Prefetching Techniques for Jobs in Grid
Predominant resources for execution of any application are computational power and memory. On one side, computational power has grown many folds faster than memory capacity. On th...
S. Radha, S. Mary Saira Bhanu, N. P. Gopalan
GECCO
2005
Springer
228views Optimization» more  GECCO 2005»
14 years 3 months ago
Applying metaheuristic techniques to search the space of bidding strategies in combinatorial auctions
Many non-cooperative settings that could potentially be studied using game theory are characterized by having very large strategy spaces and payoffs that are costly to compute. Be...
Ashish Sureka, Peter R. Wurman