Sciweavers

598 search results - page 87 / 120
» Typing the Numeric Tower
Sort
View
ASC
2004
13 years 8 months ago
Solving nonconvex climate control problems: pitfalls and algorithm performances
Global optimization can be used as the main component for reliable decision support systems. In this contribution, we explore numerical solution techniques for nonconvex and nondi...
Carmen G. Moles, Julio R. Banga, Klaus Keller
CJ
2004
99views more  CJ 2004»
13 years 8 months ago
Filters for XML-based Service Discovery in Pervasive Computing
Pervasive computing refers to an emerging trend towards numerous casually accessible devices connected to an increasingly ubiquitous network infrastructure. An important challenge...
Georgia Koloniari, Evaggelia Pitoura
CN
2004
102views more  CN 2004»
13 years 8 months ago
Comparing economic incentives in peer-to-peer networks
Users who join a peer-to-peer network have, in general, suboptimal incentives to contribute to the network, because of the externalities that exist between them. The result is an ...
Panayotis Antoniadis, Costas Courcoubetis, Robin M...
COMBINATORICS
2000
84views more  COMBINATORICS 2000»
13 years 8 months ago
A Note on the Asymptotic Behavior of the Heights in b-Tries for b Large
We study the limiting distribution of the height in a generalized trie in which external nodes are capable to store up to b items (the so called b-tries). We assume that such a tr...
Charles Knessl, Wojciech Szpankowski
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 8 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz