Sciweavers

19798 search results - page 3928 / 3960
» Is Structural Subtyping Useful
Sort
View
TON
2002
144views more  TON 2002»
13 years 7 months ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...
TON
2002
112views more  TON 2002»
13 years 7 months ago
Pricing in multiservice loss networks: static pricing, asymptotic optimality, and demand substitution effects
We consider a communication network with fixed routing that can accommodate multiple service classes, differing in bandwidth requirements, demand pattern, call duration, and routin...
Ioannis Ch. Paschalidis, Yong Liu
VLDB
2002
ACM
264views Database» more  VLDB 2002»
13 years 7 months ago
Viator - A Tool Family for Graphical Networking and Data View Creation
Web-based data sources, particularly in Life Sciences, grow in diversity and volume. Most of the data collections are equipped with common document search, hyperlink and retrieval...
Stephan Heymann, Katja Tham, Axel Kilian, Gunnar W...
VLSISP
2002
114views more  VLSISP 2002»
13 years 7 months ago
Adaptive Interference Suppression for the Downlink of a Direct Sequence CDMA System with Long Spreading Sequences
A simple approach for adaptive interference suppression for the downlink (base-to-mobile link) of a direct sequence (DS) based cellular communication system is presented. The base ...
Colin D. Frank, Eugene Visotsky, Upamanyu Madhow
MST
2007
167views more  MST 2007»
13 years 7 months ago
The Complexity of Polynomial-Time Approximation
In 1996, Khanna and Motwani [KM96] proposed three logic-based optimization problems constrained by planar structure, and offered the hypothesis that these putatively fundamental ...
Liming Cai, Michael R. Fellows, David W. Juedes, F...
« Prev « First page 3928 / 3960 Last » Next »