Sciweavers

81 search results - page 15 / 17
» Pseudorandom Financial Derivatives
Sort
View
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
13 years 1 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
MSOM
2007
118views more  MSOM 2007»
13 years 9 months ago
What Can Be Learned from Classical Inventory Models? A Cross-Industry Exploratory Investigation
: Classical inventory models offer a variety of insights into the optimal way to manage inventories of individual products. However, top managers and industry analysts are often co...
Sergey Rumyantsev, Serguei Netessine
EDBT
2006
ACM
143views Database» more  EDBT 2006»
14 years 10 months ago
XG: A Grid-Enabled Query Processing Engine
In [12] we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. In this demo we show how this architecture is le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Thom...
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
14 years 4 months ago
Continuous-time behavioral portfolio selection
This paper formulates and studies a general continuous-time behavioral portfolio selection model under Kahneman and Tversky's (cumulative) prospect theory, featuring S-shaped...
Hanqing Jin, Xun Yu Zhou
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 11 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...