Sciweavers

5741 search results - page 1066 / 1149
» Accessibility in oriented networks
Sort
View
WCE
2007
14 years 11 months ago
Constrained Path Optimisation for Underground Mine Layout
Abstract—The major infrastructure component required to develop an underground mine is a decline, which is a system of tunnels used for access and haulage. In this paper we study...
Marcus Brazil, P. A. Grossman, D. H. Lee, J. H. Ru...
DBSEC
2009
122views Database» more  DBSEC 2009»
14 years 11 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
HPDC
2010
IEEE
14 years 11 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
GECON
2008
Springer
152views Business» more  GECON 2008»
14 years 11 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
GLOBECOM
2008
IEEE
14 years 11 months ago
Cooperative OFDM Channel Estimation with Frequency Offsets
Abstract— This paper discusses channel estimation in a cooperative orthogonal frequency-division multiplexing (OFDM) network in the presence of frequency offsets. Both the amplif...
Zhongshan Zhang, Wei Zhang, Chintha Tellambura
« Prev « First page 1066 / 1149 Last » Next »