Sciweavers

77016 search results - page 15252 / 15404
» Modeling
Sort
View
CCR
2008
85views more  CCR 2008»
13 years 10 months ago
On cycles in AS relationships
y be more complex than the course modeling abstraction we adopted in [2]. Real AS relationships may depend on a peering point, prefix, and even time [2]. For example, ISPs that dom...
Xenofontas A. Dimitropoulos, M. Ángeles Ser...
CGF
2008
151views more  CGF 2008»
13 years 10 months ago
Navigation and Exploration of Interconnected Pathways
Visualizing pathways, i. e. models of cellular functional networks, is a challenging task in computer assisted biomedicine. Pathways are represented as large collections of interw...
Marc Streit, Michael Kalkusch, Karl Kashofer, Diet...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 10 months ago
Competitive Spectrum Management with Incomplete Information
An important issue in wireless communication is the interaction between selfish and independent wireless communication systems in the same frequency band. Due to the selfish natur...
Yair Noam, Amir Leshem, Hagit Messer
COR
2007
106views more  COR 2007»
13 years 10 months ago
On a stochastic sequencing and scheduling problem
We present a framework for solving multistage pure 0–1 programs for a widely used sequencing and scheduling problem with uncertainty in the objective function coefficients, the...
Antonio Alonso-Ayuso, Laureano F. Escudero, M. Ter...
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 10 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
« Prev « First page 15252 / 15404 Last » Next »