Sciweavers

1653 search results - page 225 / 331
» Timed analysis of security protocols
Sort
View
CIKM
2008
Springer
14 years 1 days ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
BIOSURVEILLANCE
2007
Springer
14 years 4 months ago
Global Foot-and-Mouth Disease Surveillance Using BioPortal
Abstract. The paper presents a description of the FMD BioPortal biosurveillance system (http://fmd.ucdavis.edu/bioportal/) that is currently operating to capture, analyze, and diss...
Mark Thurmond, Andrés Perez, Chunju Tseng, ...
EOR
2006
97views more  EOR 2006»
13 years 10 months ago
Bayesian portfolio selection with multi-variate random variance models
We consider multi-period portfolio selection problems for a decision maker with a specified utility function when the variance of security returns is described by a discrete time ...
Refik Soyer, Kadir Tanyeri
ICDCS
1995
IEEE
14 years 1 months ago
A Competitive Analysis for Retransmission Timeout
Protocols that provide reliable communicationon top of a network that can lose packets rely on periodically retransmitting packets. The choice of retransmission timeout critically...
Shlomi Dolev, Michael Kate, Jennifer L. Welch
ASMTA
2008
Springer
100views Mathematics» more  ASMTA 2008»
14 years 2 days ago
A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks
Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-toler...
Ahmad Al Hanbali, Roland de Haan, Richard J. Bouch...