Sciweavers

274 search results - page 54 / 55
» The Polymatroid Steiner Problems
Sort
View
TON
2002
144views more  TON 2002»
13 years 4 months ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...
INFOCOM
2010
IEEE
13 years 3 months ago
Information Quality Aware Routing in Event-Driven Sensor Networks
—Upon the occurrence of a phenomenon of interest in a wireless sensor network, multiple sensors may be activated, leading to data implosion and redundancy. Data aggregation and/o...
Hwee-Xian Tan, Mun-Choon Chan, Wendong Xiao, Peng ...
DCOSS
2011
Springer
12 years 5 months ago
STARS: Static relays for multi-robot real-time search and monitoring
Abstract—We first present a problem called precedence constrained two traveling salesman (PC2TSP). We propose a nearoptimal heuristic to PC2TSP to generate tours by clustering p...
Yuanteng Pei, Matt W. Mutka
ICALT
2005
IEEE
13 years 11 months ago
Empirical Validation of Concept Maps: Preliminary Methodological Considerations
For their usage in the semantic web, valid ontologies are required for a given domain. Here we focus on ontologies represented as concept maps (semantic nets). For one and the sam...
Dietrich Albert, Christina M. Steiner
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner