Sciweavers

1248 search results - page 83 / 250
» Classification-based resource selection
Sort
View
NGC
2007
Springer
128views Communications» more  NGC 2007»
14 years 9 months ago
User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid
Abstract Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources...
Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang, A...
MST
2010
93views more  MST 2010»
14 years 8 months ago
Atomic Congestion Games: Fast, Myopic and Concurrent
We study here the effect of concurrent greedy moves of players in atomic congestion games where n selfish agents (players) wish to select a resource each (out of m resources) so ...
Dimitris Fotakis, Alexis C. Kaporis, Paul G. Spira...
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
14 years 4 months ago
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ICMCS
1995
IEEE
157views Multimedia» more  ICMCS 1995»
15 years 1 months ago
A Scalable Video-on-Demand Service for the Provision of VCR-Like Functions
– One approach to supporting continuous media traffic is via resource reservation at connection establishment time. The shortcomings of this approach are the lack of flexibility...
Huang-Jen Chen, A. Krishnamurthy, Thomas D. C. Lit...
JSAC
2006
128views more  JSAC 2006»
14 years 9 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum