Sciweavers

2356 search results - page 370 / 472
» Characterizations of postman sets
Sort
View
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
15 years 4 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
TCOM
2008
83views more  TCOM 2008»
15 years 4 months ago
Toward a unified framework for modeling and analysis of diversity in joint source-channel coding
The study of Joint Source-Channel Coding (JSCC) systems faces one major challenge in obtaining an analytical expression for the function that links end-to-end distortion with chann...
Andres Kwasinski, K. J. Ray Liu
TCS
2008
15 years 4 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
IVC
2007
102views more  IVC 2007»
15 years 4 months ago
Analysis of the rubberband algorithm
We consider simple cube-curves in the orthogonal 3D grid of cells. The union of all cells contained in such a curve (also called the tube of this curve) is a polyhedrally bounded s...
Fajie Li, Reinhard Klette
JAIR
2007
103views more  JAIR 2007»
15 years 4 months ago
Obtaining Reliable Feedback for Sanctioning Reputation Mechanisms
Reputation mechanisms offer an effective alternative to verification authorities for building trust in electronic markets with moral hazard. Future clients guide their business...
Radu Jurca, Boi Faltings