Sciweavers

IWDC
2005
Springer
117views Communications» more  IWDC 2005»
14 years 2 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
IFIP
2005
Springer
14 years 2 months ago
Numerical Approximation of a Control Problem for Advection-Diffusion Processes
Two different approaches are proposed to enhance the efficiency of the numerical resolution of optimal control problems governed by a linear advection– diffusion equation. In ...
Alfio Quarteroni, Gianluigi Rozza, L. Dedè,...
IFIP
2005
Springer
14 years 2 months ago
Multi-Stage Stochastic Electricity Portfolio Optimization in Liberalized Energy Markets
In this paper we analyze the electricity portfolio problem of a big consumer in a multi-stage stochastic programming framework. Stochasticity enters the model via the uncertain spo...
Ronald Hochreiter, Georg Ch. Pflug, David Wozabal
IFIP
2005
Springer
14 years 2 months ago
Recent Advances in Bound Constrained Optimization
William W. Hager, Hongchao Zhang
IFIP
2005
Springer
14 years 2 months ago
On Warm Starts for Interior Methods
An appealing feature of interior methods for linear programming is that the number of iterations required to solve a problem tends to be relatively insensitive to the choice of in...
Anders Forsgren
IFIP
2005
Springer
14 years 2 months ago
A New Low Rank Quasi-Newton Update Scheme for Nonlinear Programming
A new quasi-Newton scheme for updating a low rank positive semi-definite Hessian approximation is described, primarily for use in sequential quadratic programming methods for non...
R. Fletcher
IFIP
2005
Springer
14 years 2 months ago
Forensic Analysis of Mobile Phone Internal Memory
Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence ...
Svein Willassen
IFIP
2005
Springer
14 years 2 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
IFIP
2005
Springer
14 years 2 months ago
Recovering Digital Evidence from Linux Systems
As Linux kernel-based operating systems gain market share there will be an inevitable increase in Linux systems that law enforcement agents must process at cybercrime scenes. The ...
Philip Craiger
IFIP
2005
Springer
14 years 2 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...