Sciweavers

1912 search results - page 176 / 383
» Optimizing interconnection policies
Sort
View
IPOM
2005
Springer
15 years 9 months ago
Comprehensive Solution for Anomaly-Free BGP
The Internet consists of many self-administered and inter-connected AutonomousSystems(ASms). ASms exchangeinter-AS routing information with each other via the Border Gateway Protoc...
Ravi Musunuri, Jorge Arturo Cobb
SAC
2010
ACM
15 years 10 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
INFOCOM
2007
IEEE
15 years 10 months ago
Cost and Collision Minimizing Forwarding Schemes for Wireless Sensor Networks
—The paper presents a novel integrated MAC/routing scheme for wireless sensor networking. Our design objective is to elect the next hop for data forwarding by minimizing the numb...
Michele Rossi, Nicola Bui, Michele Zorzi
JCDL
2005
ACM
98views Education» more  JCDL 2005»
15 years 9 months ago
Exploring user perceptions of digital image similarity
The MIDAS project is developing infrastructure and policies for optimal display of digital information on devices with diverse characteristics. In this paper we present the prelim...
Unmil Karadkar, Richard Furuta, Jeevan Joseph John...
CSCLP
2006
Springer
15 years 7 months ago
Cost-Based Filtering for Stochastic Inventory Control
Abstract. An interesting class of production/inventory control problems considers a single product and a single stocking location, given a stochastic demand with a known non-statio...
Armagan Tarim, Brahim Hnich, Roberto Rossi, Steven...