Sciweavers

2863 search results - page 300 / 573
» Constructing minimum-interference networks
Sort
View
ICDM
2010
IEEE
101views Data Mining» more  ICDM 2010»
15 years 2 months ago
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system that re...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chi...
CONEXT
2008
ACM
15 years 6 months ago
Online estimation of RF interference
Increased AP density in enterprise WLANs leads to increasing RF interference and decreasing performance. An important step towards mitigating this problem is to construct precise ...
Nabeel Ahmed, Usman Ismail, Srinivasan Keshav, Kon...
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
EUROCAST
2009
Springer
185views Hardware» more  EUROCAST 2009»
15 years 10 months ago
Solving the Euclidean Bounded Diameter Minimum Spanning Tree Problem by Clustering-Based (Meta-)Heuristics
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising in particular in network design. There exist various exact and metaheuri...
Martin Gruber, Günther R. Raidl
IWANN
2009
Springer
15 years 10 months ago
TEMMAS: The Electricity Market Multi-Agent Simulator
—This paper describes a multi-agent based simulation (MABS) framework to construct an artificial electric power market populated with learning agents. The artificial market, na...
Paulo Trigo, Paulo Marques, Helder Coelho