Sciweavers

2116 search results - page 76 / 424
» Resource Analysis by Sup-interpretation
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
OTM
2010
Springer
13 years 8 months ago
Analysis of the Performance-Influencing Factors of Virtualization Platforms
Abstract. Nowadays, virtualization solutions are gaining increasing importance. By enabling the sharing of physical resources, thus making resource usage more efficient, they promi...
Nikolaus Huber, Marcel von Quast, Fabian Brosig, S...
CORR
2011
Springer
204views Education» more  CORR 2011»
13 years 2 months ago
Decentralized Supply Chain Formation: A Market Protocol and Competitive Equilibrium Analysis
Supply chain formation is the process of determining the structure and terms of exchange relationships to enable a multilevel, multiagent production activity. We present a simple ...
William E. Walsh, Michael P. Wellman
DSD
2008
IEEE
136views Hardware» more  DSD 2008»
14 years 4 months ago
Network Interface Sharing Techniques for Area Optimized NoC Architectures
Although preliminary analysis frameworks point out the performance speed-ups achievable by on-chip networks with respect to state-of-the-art interconnects, the area concern remain...
Alberto Ferrante, Simone Medardoni, Davide Bertozz...
ICA3PP
2007
Springer
14 years 4 months ago
RSM-Based Gossip on P2P Network
Classification is a kind of basic semantics that people often use to manage versatile contents in daily life. Resource Space Model (RSM) is a semantic model for sharing and managin...
Hai Zhuge, Xiang Li