Sciweavers

1831 search results - page 316 / 367
» Time Constraints in Workflow Systems
Sort
View
AFRICACRYPT
2010
Springer
14 years 4 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
CISS
2008
IEEE
14 years 4 months ago
A linear integer programming approach to analyze P2P media streaming
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Fulu Li, Jianwei Huang, Andrew Lippman
DSRT
2008
IEEE
14 years 4 months ago
A Dynamic Area of Interest Management and Collaboration Model for P2P MMOGs
In this paper, we present a dynamic area of interest management for Massively Multiplayer Online Games (MMOG). Instead of mapping the virtual space to the area of interest (AOI), ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
GLOBECOM
2008
IEEE
14 years 4 months ago
Location-Aware Cooperative Communications Utilizing Linear Network Coding
— Cooperative communication can be used to reduce the transmit power of distant mobile units, compared to conventional direct transmission, given the same quality-of-service. How...
Hung-Quoc Lai, Ahmed S. Ibrahim, K. J. Ray Liu
ICASSP
2008
IEEE
14 years 4 months ago
Discriminative training by iterative linear programming optimization
In this paper, we cast discriminative training problems into standard linear programming (LP) optimization. Besides being convex and having globally optimal solution(s), LP progra...
Brian Mak, Benny Ng