Sciweavers

377 search results - page 50 / 76
» Constrained Codes as Networks of Relations
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 8 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
MOC
2002
144views more  MOC 2002»
13 years 7 months ago
Convergence rate analysis of an asynchronous space decomposition method for convex Minimization
Abstract. We analyze the convergence rate of an asynchronous space decomposition method for constrained convex minimization in a reflexive Banach space. This method includes as spe...
Xue-Cheng Tai, Paul Tseng
SCIENTOMETRICS
2010
131views more  SCIENTOMETRICS 2010»
13 years 2 months ago
Academic team formation as evolving hypergraphs
This paper quantitatively explores the social and socio-semantic patterns of constitution of academic collaboration teams. To this end, we broadly underline two critical features ...
Carla Taramasco, Jean-Philippe Cointet, Camille Ro...
EUSAI
2007
Springer
13 years 9 months ago
A Compiler for the Smart Space
Developing applications for smart spaces is a challenging task. Most programming systems narrowly focus on the embedded computer infrastructure and neglect the spatial aspect of th...
Urs Bischoff, Gerd Kortuem
ICC
2008
IEEE
132views Communications» more  ICC 2008»
14 years 2 months ago
An On-Off Queue Control Mechanism for Scalable Video Streaming over the IEEE 802.11e WLAN
— In this paper, we study the issue of scalable video streaming over IEEE 802.11e EDCA WLANs. Our basic idea is to control the number of “active” nodes on the channel in orde...
Yu Zhang, Chuan Heng Foh, Jianfei Cai