Sciweavers

348 search results - page 47 / 70
» Offline firewall analysis
Sort
View
INFOCOM
2000
IEEE
14 years 1 months ago
Competitive Queue Policies for Differentiated Services
We consider the setting of a network providing differentiated services. As is often the case in differentiated services, we assume that the packets are tagged as either being a hi...
William Aiello, Yishay Mansour, S. Rajagopolan, Ad...
AUTOMATICA
1999
96views more  AUTOMATICA 1999»
13 years 9 months ago
Optimization of kanban-based manufacturing systems
We develop and analyze an algorithm to maximize the throughput of a serial kanbanbased manufacturing system with arbitrary arrival and service process distributions by adjusting t...
Christos G. Panayiotou, Christos G. Cassandras
ICDAR
2009
IEEE
13 years 7 months ago
A New Method for Writer Identification of Handwritten Farsi Documents
Most studies about writer identification are based on English documents and to our knowledge no research has been reported on Farsi or Arabic documents. In this paper, we have pro...
F. Shahabi, M. Rahmati
CDC
2010
IEEE
105views Control Systems» more  CDC 2010»
13 years 4 months ago
Learning in mean-field oscillator games
This research concerns a noncooperative dynamic game with large number of oscillators. The states are interpreted as the phase angles for a collection of non-homogeneous oscillator...
Huibing Yin, Prashant G. Mehta, Sean P. Meyn, Uday...
JDCTA
2010
150views more  JDCTA 2010»
13 years 4 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao