Sciweavers

356 search results - page 51 / 72
» On the Global Solution of Linear Programs with Linear Comple...
Sort
View
HYBRID
2009
Springer
14 years 3 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
JSAC
2008
95views more  JSAC 2008»
13 years 7 months ago
Cognitive Medium Access: Constraining Interference Based on Experimental Models
In this paper we design a cognitive radio that can coexist with multiple parallel WLAN channels while abiding by an interference constraint. The interaction between both systems is...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
INFOCOM
2011
IEEE
13 years 4 days ago
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets
Abstract—Secondary spectrum access is emerging as a promising approach for mitigating the spectrum scarcity in wireless networks. Coordinated spectrum access for secondary users ...
Ajay Gopinathan, Zongpeng Li, Chuan Wu
SEAL
1998
Springer
14 years 28 days ago
A Hybrid Tabu Search Algorithm for the Nurse Rostering Problem
Abstract. This paper deals with the problem of nurse rostering in Belgian hospitals. This is a highly constrained real world problem that was (until the results of this research we...
Edmund K. Burke, Patrick De Causmaecker, Greet Van...
RTSS
2005
IEEE
14 years 2 months ago
Voltage Scaling Scheduling for Periodic Real-Time Tasks in Reward Maximization
— This paper is interested in reward maximization of periodic real-time tasks under a given energy constraint, where the reward received depends on how much computation a task ru...
Jian-Jia Chen, Tei-Wei Kuo