Sciweavers

1548 search results - page 247 / 310
» Optimization Services: A Framework for Distributed Optimizat...
Sort
View
ICICS
2007
Springer
15 years 8 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
CP
2008
Springer
15 years 6 months ago
Solving a Telecommunications Feature Subscription Configuration Problem
Abstract. Call control features (e.g., call-divert, voice-mail) are primitive options to which users can subscribe off-line to personalise their service. The configuration of a fea...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
IJIPT
2007
116views more  IJIPT 2007»
15 years 4 months ago
Context as autonomic intelligence in a ubiquitous computing environment
: This paper presents the ANS architecture that uses ubiquitous computing to monitor medical patients in the home. Since there is no notion of the patient carrying out maintenance ...
Markus C. Huebscher, Julie A. McCann, Asher Hoskin...
ANOR
2005
118views more  ANOR 2005»
15 years 4 months ago
Multitiered Supply Chain Networks: Multicriteria Decision - Making Under Uncertainty
: In this paper, we present a supply chain network model with multiple tiers of decision-makers, consisting, respectively, of manufacturers, distributors, and retailers, who can co...
June Dong, Ding Zhang, Hong Yan, Anna Nagurney
TCSV
2008
129views more  TCSV 2008»
15 years 4 months ago
Joint Source Adaptation and Resource Allocation for Multi-User Wireless Video Streaming
Multi-user video streaming over wireless channels is a challenging problem, where the demand for better video quality and small transmission delays needs to be reconciled with the ...
Jianwei Huang, Zhu Li, Mung Chiang, Aggelos K. Kat...