Sciweavers

997 search results - page 129 / 200
» Power and Area Optimization for Multiple Restricted Multipli...
Sort
View
SCN
2008
Springer
157views Communications» more  SCN 2008»
14 years 9 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
ACSAC
2009
IEEE
15 years 2 months ago
A Guided Tour Puzzle for Denial of Service Prevention
Abstract—Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a l...
Mehmud Abliz, Taieb Znati
AIPS
2004
14 years 11 months ago
Price Prediction Strategies for Market-Based Scheduling
In a market-based scheduling mechanism, the allocation of time-specific resources to tasks is governed by a competitive bidding process. Agents bidding for multiple, separately al...
Jeffrey K. MacKie-Mason, Anna Osepayshvili, Daniel...
ITSSA
2006
182views more  ITSSA 2006»
14 years 9 months ago
Evaluation of a Multi-Agent System for Hospital Patient Scheduling
: The problem of patient scheduling in hospitals is characterized by high uncertainty and dynamics in patient treatments. Additional complexity in the planning and coordination pro...
Anja Zöller, Lars Braubach, Alexander Pokahr,...
CGO
2004
IEEE
15 years 1 months ago
VHC: Quickly Building an Optimizer for Complex Embedded Architectures
To meet the high demand for powerful embedded processors, VLIW architectures are increasingly complex (e.g., multiple clusters), and moreover, they now run increasingly sophistica...
Michael Dupré, Nathalie Drach, Olivier Tema...