Sciweavers

2131 search results - page 416 / 427
» Immunity for Closed Sets
Sort
View
INFOCOM
2010
IEEE
13 years 9 months ago
Energy-Conserving Scheduling in Multi-hop Wireless Networks with Time-Varying Channels
Abstract— MaxWeight algorithm, a.k.a., back-pressure algorithm, has received much attention as a viable solution for dynamic link scheduling in multi-hop wireless networks. The b...
Yang Song, Chi Zhang, Yuguang Fang, Zhisheng Niu
INFOCOM
2010
IEEE
13 years 9 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
JSS
2010
150views more  JSS 2010»
13 years 9 months ago
Towards a general purpose architecture for UI generation
Many software projects spend a significant proportion of their time developing the User Interface (UI), therefore any degree of automation in this area has clear benefits. Such au...
Richard Kennard, John Leaney
MEDIAFORENSICS
2010
13 years 9 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
PVLDB
2010
82views more  PVLDB 2010»
13 years 9 months ago
Energy Management for MapReduce Clusters
The area of cluster-level energy management has attracted significant research attention over the past few years. One class of techniques to reduce the energy consumption of clus...
Willis Lang, Jignesh M. Patel