Sciweavers

12183 search results - page 2416 / 2437
» Computers under Attacks!
Sort
View
QUESTA
2010
112views more  QUESTA 2010»
13 years 7 months ago
Admission control for a multi-server queue with abandonment
In a M/M/N+M queue, when there are many customers waiting, it may be preferable to reject a new arrival rather than risk that arrival later abandoning without receiving service. O...
Yasar Levent Koçaga, Amy R. Ward
RTAS
2010
IEEE
13 years 7 months ago
Multi-Application Deployment in Shared Sensor Networks Based on Quality of Monitoring
Abstract—Wireless sensor networks are evolving from dedicated application-specific platforms to integrated infrastructure shared by multiple applications. Shared sensor networks...
Sangeeta Bhattacharya, Abusayeed Saifullah, Chenya...
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 7 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
SIAMCOMP
2010
94views more  SIAMCOMP 2010»
13 years 7 months ago
Local Monotonicity Reconstruction
We propose a general model of local property reconstruction. Suppose we have a function f on domain Γ, which is supposed to have a particular property P, but may not have the pro...
Michael E. Saks, C. Seshadhri
SIAMJO
2010
107views more  SIAMJO 2010»
13 years 7 months ago
Second-Order Analysis of Polyhedral Systems in Finite and Infinite Dimensions with Applications to Robust Stability of Variation
Abstract. This paper concerns second-order analysis for a remarkable class of variational systems in finite-dimensional and infinite-dimensional spaces, which is particularly imp...
René Henrion, Boris S. Mordukhovich, Nguyen...
« Prev « First page 2416 / 2437 Last » Next »