Sciweavers

14158 search results - page 421 / 2832
» Generalized switch-setting problems
Sort
View
147
Voted
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 12 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
111
Voted
JCAM
2010
107views more  JCAM 2010»
14 years 12 months ago
Pricing and hedging Asian basket spread options
Asian options, basket options and spread options have been extensively studied in literature. However, few papers deal with the problem of pricing general Asian basket spread opti...
Griselda Deelstra, Alexandre Petkovic, Michè...
165
Voted
TCS
2010
14 years 11 months ago
Monad transformers as monoid transformers
The incremental approach to modular monadic semantics constructs complex monads by using monad transformers to add computational features to a preexisting monad. A complication of...
Mauro Jaskelioff, Eugenio Moggi
167
Voted
TCS
2010
14 years 11 months ago
Resource allocation with time intervals
We study a resource allocation problem where jobs have the following characteristics: Each job consumes some quantity of a bounded resource during a certain time interval and indu...
Andreas Darmann, Ulrich Pferschy, Joachim Schauer
CORR
2011
Springer
183views Education» more  CORR 2011»
14 years 11 months ago
Reconstruction of Binary Functions and Shapes from Incomplete Frequency Information
The characterization of a binary function by partial frequency information is considered. We show that it is possible to reconstruct the binary signal from incomplete frequency me...
Yu Mao