Sciweavers

2181 search results - page 383 / 437
» The restriction scaffold problem
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Spot Pricing of Secondary Spectrum Usage in Wireless Cellular Networks
—Recent deregulation initiatives enable cellular providers to sell excess spectrum for secondary usage. In this paper, we investigate the problem of optimal spot pricing of spect...
Huseyin Mutlu, Murat Alanyali, David Starobinski
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
14 years 3 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...
ASIACRYPT
2007
Springer
14 years 2 months ago
When e-th Roots Become Easier Than Factoring
We show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the ...
Antoine Joux, David Naccache, Emmanuel Thomé...
ATAL
2007
Springer
14 years 2 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee
DNA
2007
Springer
176views Bioinformatics» more  DNA 2007»
14 years 2 months ago
Asynchronous Spiking Neural P Systems: Decidability and Undecidability
In search for “realistic” bio-inspired computing models, we consider asynchronous spiking neural P systems, in the hope to get a class of computing devices with decidable prope...
Matteo Cavaliere, Ömer Egecioglu, Oscar H. Ib...