Sciweavers

1167 search results - page 98 / 234
» policy 2007
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Analyzing Performance of Multi-User Scheduling Jointly with AMC and ARQ
—This paper deals with the analytical evaluation of the average delay, the packet-loss rate (PLR) and the throughput of a multi-user (MU) wireless system that capitalizes on a cr...
Mario Poggioni, Luca Rugini, Paolo Banelli
CSFW
2007
IEEE
15 years 8 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ICCBR
2007
Springer
15 years 10 months ago
An Analysis of Case-Based Value Function Approximation by Approximating State Transition Graphs
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
Thomas Gabel, Martin Riedmiller
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
15 years 8 months ago
Realizing Privacy-Preserving Features in Hippocratic Databases
Preserving privacy has become a crucial requirement for operating a business that manages personal data. Hippocratic databases have been proposed to answer this requirement throug...
Yasin Laura-Silva, Walid G. Aref
WSC
2007
15 years 6 months ago
Emergency departments nurse allocation to face a pandemic influenza outbreak
This study proposes a nurse allocation policy to manage patient overflow during a pandemic influenza outbreak. The objective is to minimize the number of patients waiting in queue...
Florentino Rico, Ehsan Salari, Grisselle Centeno