Sciweavers

2863 search results - page 506 / 573
» Constructing minimum-interference networks
Sort
View
MOZ
2004
Springer
15 years 6 months ago
P2PS: Peer-to-Peer Development Platform for Mozart
Abstract. Recently, development of peer-to-peer (P2P) applications has been giving a paramount attention mostly due to their attractive features such as decentralization and self-o...
Valentin Mesaros, Bruno Carton, Peter Van Roy
PPSN
2004
Springer
15 years 6 months ago
The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
Two ideas taken from Bayesian optimization and classifier systems are presented for personnel scheduling based on choosing a suitable scheduling rule from a set for each person’s...
Jingpeng Li, Uwe Aickelin
SEM
2004
Springer
15 years 6 months ago
Supporting Generalized Context Interactions
Abstract. Context-awareness refers to a computing model where application behavior is driven by a continually-changing environment. Mobile computing poses unique challenges to cont...
Gregory Hackmann, Christine Julien, Jamie Payton, ...
WISA
2004
Springer
15 years 6 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafď...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
ACSAC
2003
IEEE
15 years 6 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...