Sciweavers

349 search results - page 57 / 70
» Symmetrically exploiting XML
Sort
View
IOR
2010
72views more  IOR 2010»
13 years 8 months ago
On the Impact of Forward Markets on Investments in Oligopolistic Markets with Reference to Electricity
There is a general agreement since Allaz-Vila’s seminal contribution that forward contracts mitigate market power on the spot market. This result is widely quoted and elaborated...
Frederic H. Murphy, Yves Smeers
ITNG
2010
IEEE
13 years 8 months ago
Record Setting Software Implementation of DES Using CUDA
—The increase in computational power of off-the-shelf hardware offers more and more advantageous tradeoffs among efficiency, cost and availability, thus enhancing the feasibil...
Giovanni Agosta, Alessandro Barenghi, Fabrizio De ...
JSAC
2010
86views more  JSAC 2010»
13 years 8 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
PERCOM
2010
ACM
13 years 8 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
13 years 7 months ago
Location and Scatter Matching for Dataset Shift in Text Mining
Dataset shift from the training data in a source domain to the data in a target domain poses a great challenge for many statistical learning methods. Most algorithms can be viewed ...
Bo Chen, Wai Lam, Ivor W. Tsang, Tak-Lam Wong