Sciweavers

4335 search results - page 9 / 867
» Privatizing Constraint Optimization
Sort
View
POLICY
2007
Springer
14 years 1 months ago
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
A VoIP PBX supports flexible call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. Both users and administrators need a flexi...
George Konstantoulakis, Morris Sloman
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
13 years 8 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
SODA
2010
ACM
164views Algorithms» more  SODA 2010»
14 years 5 months ago
Differentially Private Approximation Algorithms
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...
INFOCOM
2002
IEEE
14 years 14 days ago
Restoration Algorithms for Virtual Private Networks in the Hose Model
—A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of e connected using abstractions such as Virt...
Giuseppe F. Italiano, Rajeev Rastogi, Bülent ...
GLOBECOM
2007
IEEE
14 years 1 months ago
Hierarchical Provisioning Algorithm for Virtual Private Networks Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. Two models were proposed for the service provisioning i...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja