Sciweavers

1380 search results - page 246 / 276
» Computing the optimal strategy to commit to
Sort
View
IEEESP
2010
99views more  IEEESP 2010»
13 years 6 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
TKDE
2010
164views more  TKDE 2010»
13 years 6 months ago
PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
—Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a privacy-aware monitoring (PAM) framework that addresses both issues. The fra...
Haibo Hu, Jianliang Xu, Dik Lun Lee
IJPP
2010
156views more  IJPP 2010»
13 years 5 months ago
ForestGOMP: An Efficient OpenMP Environment for NUMA Architectures
Exploiting the full computational power of current hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-uniform ar...
François Broquedis, Nathalie Furmento, Bric...
ICC
2011
IEEE
203views Communications» more  ICC 2011»
12 years 8 months ago
Constellation Shaping for Bit-Interleaved Coded APSK
—This paper considers a technique for shaping a turbo-coded amplitude-phase shift keying (APSK) constellation. After bit-interleaving, a subset of the bits output by a binary tur...
Matthew C. Valenti, Xingyu Xiang
SIGMOD
2009
ACM
201views Database» more  SIGMOD 2009»
14 years 8 months ago
Cost based plan selection for xpath
We present a complete XPath cost-based optimization and execution framework and demonstrate its effectiveness and efficiency for a variety of queries and datasets. The framework i...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...