Sciweavers

2028 search results - page 119 / 406
» Deriving Relation Keys from XML Keys
Sort
View
COMBINATORICS
2000
74views more  COMBINATORICS 2000»
15 years 4 months ago
Frequency Squares and Affine Designs
The known methods for constructing complete sets of mutually orthogonal frequency squares all yield one of two parameter sets. We show that almost all these constructions can be d...
Vassili C. Mavron
COMCOM
1998
81views more  COMCOM 1998»
15 years 4 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh
RE
2008
Springer
15 years 3 months ago
Requirements Prioritization Based on Benefit and Cost Prediction: An Agenda for Future Research
In early phases of the software cycle, requirements prioritization necessarily relies on the specified requirements and on predictions of benefit and cost of individual requiremen...
Andrea Herrmann, Maya Daneva
ANOR
2011
124views more  ANOR 2011»
14 years 11 months ago
Stochastic dominance of portfolio insurance strategies - OBPI versus CPPI
Abstract The purpose of this article is to analyze and compare two standard portfolio insurance methods: Option-based Portfolio Insurance (OBPI) and Constant Proportion Portfolio I...
Rudi Zagst, Julia Kraus
IWQOS
2005
Springer
15 years 10 months ago
QoS in Hybrid Networks - An Operator's Perspective
The goal of this paper is to foster discussions on future directions for QoS related research. The paper takes the viewpoint of an operator; as an example it presents the topology,...
Aiko Pras, Remco van de Meent, Michel Mandjes