Sciweavers

5123 search results - page 28 / 1025
» Performance and Security Tradeoff
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Applying a Tradeoff Model (TOM) to TACT
In a software system, it is inevitable that components will occasionally fail to produce acceptable results and become unavailable to serve its clients. Replication is the techniq...
Raihan Al-Ekram, Richard C. Holt, Chris Hobbs
ICMAS
2000
13 years 9 months ago
Using Similarity Criteria to Make Negotiation Trade-Offs
This paper addresses the issues involved in software agents making trade-offs during automated negotiations in which they have information uncertainty and resource limitations. In...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...
WISEC
2010
ACM
14 years 3 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
WIOPT
2006
IEEE
14 years 2 months ago
Intelligent packet dropping for optimal energy-delay tradeoffs in wireless downlinks
— We explore the advantages of intelligently dropping a small fraction of packets that arrive for transmission over a time varying wireless downlink. Without packet dropping, the...
Michael J. Neely
MEDIAFORENSICS
2010
13 years 10 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro