Sciweavers

612 search results - page 50 / 123
» Utilitarian resource assignment
Sort
View
ACSAC
2003
IEEE
14 years 3 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
ICC
2007
IEEE
127views Communications» more  ICC 2007»
14 years 2 months ago
Joint Capacity, Flow and Rate Allocation for Multiuser Video Streaming Over Wireless Ad-Hoc Networks
Abstract-- Simultaneous support of multiple delay-critical application sessions such as multiuser video streaming require a paradigm shift in the design of ad-hoc wireless networks...
Sachin Adlakha, Xiaoqing Zhu, Bernd Girod, Andrea ...
JCM
2007
105views more  JCM 2007»
13 years 10 months ago
A Flexible Wavelength Converter Placement Scheme for Guaranteed Wavelength Usage
Abstract— Wavelength is one of the most important resources in Wavelength Division Multiplexing(WDM) networks. In optical routing, we are given a set of communication paths (or l...
Can Fang, Chor Ping Low
CP
2004
Springer
14 years 3 months ago
A Hybrid Method for Planning and Scheduling
We combine mixed integer linear programming (MILP) and constraint programming (CP) to solve planning and scheduling problems. Tasks are allocated to facilities using MILP and sche...
John N. Hooker
WWW
2008
ACM
14 years 11 months ago
On the Effect of Group Structures on Ranking Strategies in Folksonomies
Folksonomies have shown interesting potential for improving information discovery and exploration. Recent folksonomy systems investigate on the use of tag assignments, which combi...
Fabian Abel, Nicola Henze, Daniel Krause, Matthias...