Sciweavers

2488 search results - page 346 / 498
» Distributed Non-binary Constraints
Sort
View
CSR
2007
Springer
15 years 11 months ago
Maximal Intersection Queries in Randomized Graph Models
Consider a family of sets and a single set, called query set. How can one quickly find a member of the family which has a maximal intersection with the query set? Strict time cons...
Benjamin Hoffmann, Yury Lifshits, Dirk Nowotka
139
Voted
HPCC
2007
Springer
15 years 11 months ago
Stability Aware Routing: Exploiting Transient Route Availability in MANETs
The highly dynamic character of a mobile ad-hoc network (MANET) poses significant challenges on network communications and resource management. Previous work on routing in MANETs ...
Pramita Mitra, Christian Poellabauer, Shivajit Moh...
ICSOC
2007
Springer
15 years 11 months ago
Dynamic Service Provisioning Using GRIA SLAs
Service Level Agreements (SLA) include quality of service (QoS) constraints and bounds that have to be honoured by the service provider. To maximise the Service Provider revenue wh...
Mike J. Boniface, Stephen C. Phillips, Alfonso S&a...
ICSOC
2007
Springer
15 years 11 months ago
Towards Self-management in Service-Oriented Computing with Modes
Abstract. A self-managed system is both self-assembling and selfhealing. Service-oriented Computing (SoC) architectures, such as a Web Services Architecture (WS-A) illustrate a hig...
Howard Foster, Sebastián Uchitel, Jeff Kram...
GLOBECOM
2006
IEEE
15 years 11 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...