Sciweavers

96 search results - page 9 / 20
» Bridging the Network Reservation Gap Using Overlays
Sort
View
ORL
1998
136views more  ORL 1998»
14 years 9 months ago
A primal-dual interpretation of two 2-approximation algorithms for the feedback vertex set problem in undirected graphs
Recently, Becker and Geiger and Bafna, Berman and Fujito gave 2-approximation algorithms for the feedback vertex set problem in undirected graphs. We show how their algorithms can...
Fabián A. Chudak, Michel X. Goemans, Dorit ...
DSN
2008
IEEE
15 years 3 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
ISCI
2007
152views more  ISCI 2007»
14 years 9 months ago
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes
Digital video recorder (DVR) systems are novel security products with significant potential for application in the surveillance market, which, like many other areas of security t...
Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lu...
171
Voted
ASUNAM
2011
IEEE
13 years 9 months ago
Locating Central Actors in Co-offending Networks
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...
Mohammad A. Tayebi, Laurens Bakker, Uwe Gläss...
ICDCSW
2005
IEEE
15 years 3 months ago
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast
Theorists and practitioners have fairly different perspectives on how wireless broadcast works. Theorists think about synchrony; practitioners think about backoff. Theorists assum...
Gregory Chockler, Murat Demirbas, Seth Gilbert, Na...