Sciweavers

3628 search results - page 666 / 726
» The Decision Diffie-Hellman Problem
Sort
View
ICDCS
2010
IEEE
14 years 1 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
ICDCS
2010
IEEE
14 years 1 months ago
Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage
—We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic scheduling, wherein the ...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
14 years 1 months ago
Overlapping experiment infrastructure: more, better, faster experimentation
At Google, experimentation is practically a mantra; we evaluate almost every change that potentially affects what our users experience. Such changes include not only obvious user-...
Diane Tang, Ashish Agarwal, Deirdre O'Brien, Mike ...
RTA
2010
Springer
14 years 1 months ago
Automata for Data Words and Data Trees
Data words and data trees appear in verification and XML processing. The term “data” means that positions of the word, or tree, are decorated with elements of an infinite set...
Mikolaj Bojanczyk
WCNC
2010
IEEE
14 years 1 months ago
Hedonic Coalition Formation Games for Secondary Base Station Cooperation in Cognitive Radio Networks
— In order to maintain a conflict-free environment among licensed primary users (PUs) and unlicensed secondary users (SUs) in cognitive radio networks, providing frequency and g...
Walid Saad, Zhu Han, Tamer Basar, Are Hjøru...