Sciweavers

3451 search results - page 627 / 691
» Collaborative attack modeling
Sort
View
PE
2007
Springer
140views Optimization» more  PE 2007»
13 years 7 months ago
Stochastic analysis of file-swarming systems
File swarming (or file sharing) is one of the most important applications in P2P networks. In this paper, we propose a stochastic framework to analyze a file swarming system und...
Minghong Lin, Bin Fan, John C. S. Lui, Dah-Ming Ch...
JAIR
2010
82views more  JAIR 2010»
13 years 6 months ago
Non-Transferable Utility Coalitional Games via Mixed-Integer Linear Constraints
Coalitional games serve the purpose of modeling payoff distribution problems in scenarios where agents can collaborate by forming coalitions in order to obtain higher worths than...
Gianluigi Greco, Enrico Malizia, Luigi Palopoli, F...
JSAC
2010
194views more  JSAC 2010»
13 years 6 months ago
Burst communication by means of buffer allocation in body sensor networks: Exploiting signal processing to reduce the number of
Abstract—Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. Such platforms use inertial information of their...
Hassan Ghasemzadeh, Vitali Loseu, Sarah Ostadabbas...
PVLDB
2010
168views more  PVLDB 2010»
13 years 6 months ago
Active Complex Event Processing: Applications in Real-Time Health Care
Our analysis of many real-world event based applications has revealed that existing Complex Event Processing technology (CEP), while effective for efficient pattern matching on e...
Di Wang, Elke A. Rundensteiner, Richard Ellison, H...
TPDS
2010
83views more  TPDS 2010»
13 years 6 months ago
Robust Load Delegation in Service Grid Environments
—In this paper, we address the problem of finding well-performing workload exchange policies for decentralized Computational Grids using an Evolutionary Fuzzy System. To this end...
Alexander Fölling, Christian Grimme, Joachim ...