Sciweavers

367 search results - page 50 / 74
» The Return of the Sensitivity Attack
Sort
View
EOR
2008
76views more  EOR 2008»
13 years 7 months ago
Rental price and rental duration under retail competition
Consider a retailer that rents products to customers for a pre-specified rental duration. By considering the dynamics of uncertain rental demand and return processes, we first pre...
Christopher S. Tang, Sarang Deo
COMPGEOM
2011
ACM
12 years 11 months ago
An output-sensitive algorithm for persistent homology
In this paper, we present the first output-sensitive algorithm to compute the persistence diagram of a filtered simplicial complex. For any Γ > 0, it returns only those homo...
Chao Chen, Michael Kerber
INFOCOM
2011
IEEE
12 years 11 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
CCS
2011
ACM
12 years 7 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
GPCE
2007
Springer
14 years 1 months ago
Simple and safe SQL queries with c++ templates
Most software applications use a relational database for data management and storage. Interaction with such a database is often done by letting the program construct strings with ...
Joseph Gil, Keren Lenz