Sciweavers

2983 search results - page 489 / 597
» The group marriage problem
Sort
View
IANDC
2008
150views more  IANDC 2008»
13 years 9 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
CN
2006
99views more  CN 2006»
13 years 9 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
COMCOM
2006
80views more  COMCOM 2006»
13 years 9 months ago
Overlay subgroup communication in large-scale multicast applications
In the paper, we consider a preference heterogeneity problem in large-scale multicast applications. Abundant content, data type and diverse members' interests naturally lead ...
Jangwon Lee, Gustavo de Veciana
COR
2006
99views more  COR 2006»
13 years 9 months ago
Artificial neural networks and multicriterion analysis for sustainable irrigation planning
The objective of the present paper is to select the best compromise irrigation planning strategy for the case study of Jayakwadi irrigation project, Maharashtra, India. Four-phase...
K. Srinivasa Raju, D. Nagesh Kumar, Lucien Duckste...
CORR
2006
Springer
90views Education» more  CORR 2006»
13 years 9 months ago
Path-independent load balancing with unreliable machines
We consider algorithms for load balancing on unreliable machines. The objective is to optimize the two criteria of minimizing the makespan and minimizing job reassignments in resp...
James Aspnes, Yang Richard Yang, Yitong Yin