Sciweavers

1195 search results - page 235 / 239
» An Inventory-Location Model: Formulation, Solution Algorithm...
Sort
View
AAI
2007
132views more  AAI 2007»
13 years 7 months ago
Incremental Extraction of Association Rules in Applicative Domains
In recent years, the KDD process has been advocated to be an iterative and interactive process. It is seldom the case that a user is able to answer immediately with a single query...
Arianna Gallo, Roberto Esposito, Rosa Meo, Marco B...
INFOCOM
2003
IEEE
14 years 23 days ago
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter
Abstract— This paper studies the problem of designing survivable optical wavelength division multiplexed (WDM) networks. A wavelength-routed wide area backbone network supporting...
Sunil Gowda, Krishna M. Sivalingam
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
TCSV
2002
167views more  TCSV 2002»
13 years 7 months ago
Three-dimensional subband coding techniques for wireless video communications
This paper presents a new 3-D subband coding framework that is able to achieve a good balance between high compression performance and channel error resilience. Various data transf...
Hong Man, Ricardo L. de Queiroz, Mark J. T. Smith
COR
2007
163views more  COR 2007»
13 years 7 months ago
A general heuristic for vehicle routing problems
We present a unified heuristic, which is able to solve five different variants of the vehicle routing problem: the vehicle routing problem with time windows (VRPTW), the capacit...
David Pisinger, Stefan Ropke