Sciweavers

552 search results - page 70 / 111
» Resource allocation games with changing resource capacities
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network
The issue of information security has attracted increasing attention in recent years. In network attack and defense scenarios, attackers and defenders constantly change their resp...
Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin
INFOCOM
2012
IEEE
11 years 10 months ago
Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum
—Recent advances in cognitive radio (CR) technology have brought about a number of wireless standards that support opportunistic access to available white-space spectrum. Address...
Bo Gao, Jung-Min Park 0001, Yaling Yang
IM
2003
13 years 9 months ago
Performance Management for Cluster Based Web Services
: We present an architecture and prototype implementation of a performance management system for cluster-based web services. The system supports multiple classes of web services tr...
Ronald M. Levy, Jay Nagarajarao, Giovanni Pacifici...
WSC
2008
13 years 10 months ago
Optimizing portfolio tail measures: Asymptotics and efficient simulation optimization
We consider a portfolio allocation problem where the objective function is a tail event such as probability of large portfolio losses. The dependence between assets is captured th...
Sandeep Juneja
AUSDM
2007
Springer
145views Data Mining» more  AUSDM 2007»
14 years 2 months ago
Discovering Frequent Sets from Data Streams with CPU Constraint
Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recogniz...
Xuan Hong Dang, Wee Keong Ng, Kok-Leong Ong, Vince...