Sciweavers

5510 search results - page 1082 / 1102
» Mathematics
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
IWPC
2010
IEEE
14 years 8 months ago
Studying the Impact of Social Structures on Software Quality
Abstract—Correcting software defects accounts for a significant amount of resources such as time, money and personnel. To be able to focus testing efforts where needed the most,...
Nicolas Bettenburg, Ahmed E. Hassan
JNS
2010
98views more  JNS 2010»
14 years 8 months ago
Analysis of a General Family of Regularized Navier-Stokes and MHD Models
ABSTRACT. We consider a general family of regularized Navier-Stokes and Magnetohydrodynamics (MHD) models on n-dimensional smooth compact Riemannian manifolds with or without bound...
Michael Holst, Evelyn Lunasin, Gantumur Tsogtgerel
JOT
2010
97views more  JOT 2010»
14 years 8 months ago
Towards a theory and calculus of aliasing
A theory, graphical notation, mathematical calculus and implementation for finding whether two given expressions can, at execution time, denote references attached to the same obj...
Bertrand Meyer
MANSCI
2010
95views more  MANSCI 2010»
14 years 8 months ago
Using Scheduled Ordering to Improve the Performance of Distribution Supply Chains
We study a supply chain with one supplier and many retailers that face exogenous endcustomer demands. The supplier and the retailers all try to minimize their own inventory-relate...
Lucy Gongtao Chen, Srinagesh Gavirneni
« Prev « First page 1082 / 1102 Last » Next »