Sciweavers

1380 search results - page 246 / 276
» Computing the optimal strategy to commit to
Sort
View
99
Voted
IEEESP
2010
99views more  IEEESP 2010»
15 years 1 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
135
Voted
TKDE
2010
164views more  TKDE 2010»
15 years 1 months ago
PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
—Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a privacy-aware monitoring (PAM) framework that addresses both issues. The fra...
Haibo Hu, Jianliang Xu, Dik Lun Lee
132
Voted
IJPP
2010
156views more  IJPP 2010»
15 years 14 hour ago
ForestGOMP: An Efficient OpenMP Environment for NUMA Architectures
Exploiting the full computational power of current hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-uniform ar...
François Broquedis, Nathalie Furmento, Bric...
115
Voted
ICC
2011
IEEE
203views Communications» more  ICC 2011»
14 years 2 months ago
Constellation Shaping for Bit-Interleaved Coded APSK
—This paper considers a technique for shaping a turbo-coded amplitude-phase shift keying (APSK) constellation. After bit-interleaving, a subset of the bits output by a binary tur...
Matthew C. Valenti, Xingyu Xiang
213
Voted
SIGMOD
2009
ACM
201views Database» more  SIGMOD 2009»
16 years 3 months ago
Cost based plan selection for xpath
We present a complete XPath cost-based optimization and execution framework and demonstrate its effectiveness and efficiency for a variety of queries and datasets. The framework i...
Haris Georgiadis, Minas Charalambides, Vasilis Vas...