Sciweavers

198 search results - page 11 / 40
» An Effective Characterization of Computability in Anonymous ...
Sort
View
WINE
2010
Springer
129views Economy» more  WINE 2010»
13 years 6 months ago
Optimal Pricing in the Presence of Local Network Effects
We study the optimal pricing strategies of a monopolist selling a divisible good (service) to consumers that are embedded in a social network. A key feature of our model is that c...
Ozan Candogan, Kostas Bimpikis, Asuman E. Ozdaglar
GPC
2007
Springer
14 years 25 days ago
Assessing Contention Effects on MPI_Alltoall Communications
Abstract. One of the most important collective communication patterns used in scientific applications is the complete exchange, also called All-to-All. Although efficient algorithm...
Luiz Angelo Steffenel, Maxime Martinasso, Denis Tr...
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
ICNP
1998
IEEE
14 years 17 days ago
Flow Theory: An Enhancement
Flow Theory is a rich, effective theory introduced in order to study real-time network protocols. It is based on discrete mathematics in which a flow of data is represented by an ...
Alfio Lombardo, Giacomo Morabito, Sergio Palazzo, ...
SDM
2009
SIAM
291views Data Mining» more  SDM 2009»
14 years 6 months ago
Detection and Characterization of Anomalies in Multivariate Time Series.
Anomaly detection in multivariate time series is an important data mining task with applications to ecosystem modeling, network traffic monitoring, medical diagnosis, and other d...
Christopher Potter, Haibin Cheng, Pang-Ning Tan, S...