Sciweavers

929 search results - page 89 / 186
» heuristics 2008
Sort
View
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 12 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
CP
2008
Springer
15 years 7 months ago
Length-Lex Bounds Consistency for Knapsack Constraints
Recently, a new domain store for set-variables has been proposed which totally orders all values in the domain of a set-variable based on cardinality and lexicography. Traditionall...
Yuri Malitsky, Meinolf Sellmann, Willem Jan van Ho...
CIS
2008
Springer
15 years 7 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
ICC
2008
IEEE
159views Communications» more  ICC 2008»
15 years 12 months ago
Link Scheduling and Power Control in Wireless Mesh Networks with Directional Antennas
— Directional antennas are very attractive in Wireless Mesh Networks (WMN). We study the problem of link scheduling and power control in a Time-Division Multiple Access (TDMA) WM...
Vishwanath Ramamurthi, Abu Ahmed Reaz, Sudhir S. D...
197
Voted
ISORC
2008
IEEE
15 years 12 months ago
Toward Effective Multi-Capacity Resource Allocation in Distributed Real-Time and Embedded Systems
Effective resource management for distributed real-time embedded (DRE) systems is hard due to their unique characteristics, including (1) constraints in multiple resources and (2)...
Nilabja Roy, John S. Kinnebrew, Nishanth Shankaran...