Sciweavers

639 search results - page 128 / 128
» Dominance Constraints with Set Operators
Sort
View
INFOCOM
2010
IEEE
13 years 3 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
WIOPT
2010
IEEE
13 years 3 months ago
On maximizing collaboration in Wireless Mesh Networks without monetary incentives
—In distributed network settings, where nodes are not under the control of a single administrative entity, the fulfillment of fundamental network operations is heavily dependent...
Gabriel Popa, Éric Gourdin, Franck Legendre...
AMSTERDAM
2009
13 years 2 months ago
There Is Something about Might
In this paper we present an alternative interpretation of statements of epistemic possibility, which does not induce a consistency test on a common ground, as in (Veltman 1996), bu...
Paul Dekker
TSMC
2010
12 years 11 months ago
Extending the Adaptability of Reference Models
Reference models are an important aid for business process modeling and design. Their aim is to capture domain knowledge and assist in the design of enterprise specific business pr...
Iris Reinhartz-Berger, Pnina Soffer, Arnon Sturm