Sciweavers

535 search results - page 83 / 107
» Concurrency Control: Methods, Performance, and Analysis
Sort
View
201
Voted
SIGMOD
2006
ACM
125views Database» more  SIGMOD 2006»
16 years 4 months ago
Personalized privacy preservation
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for...
Xiaokui Xiao, Yufei Tao
163
Voted
CDC
2008
IEEE
236views Control Systems» more  CDC 2008»
15 years 10 months ago
Non-monotonic Lyapunov functions for stability of discrete time nonlinear and switched systems
Abstract— We relax the monotonicity requirement of Lyapunov’s theorem to enlarge the class of functions that can provide certificates of stability. To this end, we propose two...
Amir Ali Ahmadi, Pablo A. Parrilo
131
Voted
JCP
2006
110views more  JCP 2006»
15 years 3 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
177
Voted
TEC
2002
183views more  TEC 2002»
15 years 3 months ago
The particle swarm - explosion, stability, and convergence in a multidimensional complex space
Abstract--The particle swarm is an algorithm for finding optimal regions of complex search spaces through the interaction of individuals in a population of particles. Even though t...
Maurice Clerc, James Kennedy
150
Voted
NDSS
2003
IEEE
15 years 9 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal