Sciweavers

12183 search results - page 2416 / 2437
» Computers under Attacks!
Sort
View
QUESTA
2010
112views more  QUESTA 2010»
14 years 10 months ago
Admission control for a multi-server queue with abandonment
In a M/M/N+M queue, when there are many customers waiting, it may be preferable to reject a new arrival rather than risk that arrival later abandoning without receiving service. O...
Yasar Levent Koçaga, Amy R. Ward
RTAS
2010
IEEE
14 years 10 months ago
Multi-Application Deployment in Shared Sensor Networks Based on Quality of Monitoring
Abstract—Wireless sensor networks are evolving from dedicated application-specific platforms to integrated infrastructure shared by multiple applications. Shared sensor networks...
Sangeeta Bhattacharya, Abusayeed Saifullah, Chenya...
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 10 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
88
Voted
SIAMCOMP
2010
94views more  SIAMCOMP 2010»
14 years 10 months ago
Local Monotonicity Reconstruction
We propose a general model of local property reconstruction. Suppose we have a function f on domain Γ, which is supposed to have a particular property P, but may not have the pro...
Michael E. Saks, C. Seshadhri
SIAMJO
2010
107views more  SIAMJO 2010»
14 years 10 months ago
Second-Order Analysis of Polyhedral Systems in Finite and Infinite Dimensions with Applications to Robust Stability of Variation
Abstract. This paper concerns second-order analysis for a remarkable class of variational systems in finite-dimensional and infinite-dimensional spaces, which is particularly imp...
René Henrion, Boris S. Mordukhovich, Nguyen...
« Prev « First page 2416 / 2437 Last » Next »