Sciweavers

948 search results - page 27 / 190
» Analysis of SITA policies
Sort
View
TON
2012
13 years 6 days ago
Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis
—The deployment of cognitive radio networks enables efficient spectrum sharing and opportunistic spectrum access. It also presents new challenges to the classical problem of int...
Siamak Sorooshyari, Chee Wei Tan, Mung Chiang
ICSE
2012
IEEE-ACM
13 years 4 days ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
USS
2010
14 years 7 months ago
An Analysis of Private Browsing Modes in Modern Browsers
We study the security and privacy of private browsing modes recently added to all major browsers. We first propose a clean definition of the goals of private browsing and survey i...
Gaurav Aggarwal, Elie Bursztein, Collin Jackson, D...
EOR
2011
124views more  EOR 2011»
14 years 4 months ago
Analysis of order-up-to-level inventory systems with compound Poisson demand
: We analyse a single echelon single item inventory system where the demand and the lead time are stochastic. Demand is modelled as a compound Poisson process and the stock is cont...
M. Zied Babai, Zied Jemaï, Yves Dallery
PE
2010
Springer
132views Optimization» more  PE 2010»
14 years 4 months ago
Optimality analysis of energy-performance trade-off for server farm management
A central question in designing server farms today is how to efficiently provision the number of servers to extract the best performance under unpredictable demand patterns while ...
Anshul Gandhi, Varun Gupta, Mor Harchol-Balter, Mi...