Sciweavers

54 search results - page 11 / 11
» Constrained Tracking on a Road Network
Sort
View
CSFW
2000
IEEE
13 years 9 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
ATMOS
2007
161views Optimization» more  ATMOS 2007»
13 years 7 months ago
Periodic Railway Timetabling with Event Flexibility
This paper addresses the problem of generating conflict-free periodic train timetables for large railway networks. We follow a two level approach, where a simplified track topolo...
Gabrio Curzio Caimi, Martin Fuchsberger, Marco Lau...
GLOBECOM
2008
IEEE
14 years 7 days ago
Adaptive Soft Frequency Reuse for Inter-Cell Interference Coordination in SC-FDMA Based 3GPP LTE Uplinks
This paper proposes a decentralized adaptive soft frequency reuse scheme for the uplink of a 4G long-term evolution (LTE) system. While universal frequencies reuse (UFR) is being ...
Xuehong Mao, Amine Maaref, Koon Hoo Teo
ACSAC
2009
IEEE
14 years 18 days ago
Analyzing Information Flow in JavaScript-Based Browser Extensions
JavaScript-based browser extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and are widely available for commodity browsers. To ena...
Mohan Dhawan, Vinod Ganapathy