Sciweavers

11488 search results - page 2231 / 2298
» Robust optimization - methodology and applications
Sort
View
VEE
2005
ACM
174views Virtualization» more  VEE 2005»
14 years 2 months ago
PDS: a virtual execution environment for software deployment
The Progressive Deployment System (PDS) is a virtual execution environment and infrastructure designed specifically for deploying software, or “assets”, on demand while enabli...
Bowen Alpern, Joshua S. Auerbach, Vasanth Bala, Th...
WOWMOM
2005
ACM
148views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks
Both Mobile Ad Hoc Networks (MANETs) and Peer-toPeer (P2P) Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a d...
Leonardo B. Oliveira, Isabela G. Siqueira, Daniel ...
ATAL
2005
Springer
14 years 2 months ago
An agent-based approach for managing symbiotic simulation of semiconductor assembly and test operation
The rapid changing business environment of high-tech asset intensive enterprises such as semiconductor manufacturing constantly drives production managers to look for better solut...
Malcolm Yoke-Hean Low, Kong Wei Lye, Peter Lenderm...
CIKM
2005
Springer
14 years 2 months ago
Internet scale string attribute publish/subscribe data networks
With this work we aim to make a three-fold contribution. We first address the issue of supporting efficiently queries over string-attributes involving prefix, suffix, containmen...
Ioannis Aekaterinidis, Peter Triantafillou
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
« Prev « First page 2231 / 2298 Last » Next »