Sciweavers

5891 search results - page 1088 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
JSAC
2011
191views more  JSAC 2011»
14 years 11 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
181
Voted
TASE
2011
IEEE
14 years 11 months ago
Dynamic Pricing and Inventory Control in a Make-to-Stock Queue With Information on the Production Status
: This paper addresses the dynamic pricing problem of a single-item, make-to-stock production system. Demand arrives according to Poisson processes with changeable arrival rate dep...
Liuxin Chen, Youhua Chen, Zhan Pang
SIAMSC
2011
140views more  SIAMSC 2011»
14 years 7 months ago
A Fast Parallel Algorithm for Selected Inversion of Structured Sparse Matrices with Application to 2D Electronic Structure Calcu
Abstract. An efficient parallel algorithm is presented and tested for computing selected components of H−1 where H has the structure of a Hamiltonian matrix of two-dimensional la...
Lin Lin, Chao Yang, Jianfeng Lu, Lexing Ying, Wein...
ANCS
2007
ACM
15 years 8 months ago
On LID assignment in infiniBand networks
To realize a path in an InfiniBand network, an address, known as Local IDentifier (LID) in the InfiniBand specification, must be assigned to the destination and used in the forwar...
Wickus Nienaber, Xin Yuan, Zhenhai Duan
ATAL
2005
Springer
15 years 10 months ago
Exploiting belief bounds: practical POMDPs for personal assistant agents
Agents or agent teams deployed to assist humans often face the challenges of monitoring the state of key processes in their environment (including the state of their human users t...
Pradeep Varakantham, Rajiv T. Maheswaran, Milind T...
« Prev « First page 1088 / 1179 Last » Next »