Sciweavers

2043 search results - page 331 / 409
» Some Basics on Tolerances
Sort
View
IWC
2011
86views more  IWC 2011»
14 years 6 months ago
Selecting users for participation in IT projects: Trading a representative sample for advocates and champions?
The selection of users for participation in IT projects involves trade-offs between multiple criteria, one of which is selecting a representative cross-section of users. This crite...
Rasmus Rasmussen, Anders S. Christensen, Tobias Fj...
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 6 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
TKDE
2011
362views more  TKDE 2011»
14 years 6 months ago
A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
—This work introduces a link-analysis procedure for discovering relationships in a relational database or a graph, generalizing both simple and multiple correspondence analysis. ...
Luh Yen, Marco Saerens, François Fouss
TON
2010
176views more  TON 2010»
14 years 6 months ago
Approximation of Generalized Processor Sharing With Interleaved Stratified Timer Wheels
This paper presents Interleaved Stratified Timer Wheels as a novel priority queue data structure for traffic shaping and scheduling in packet-switched networks. The data structure ...
Martin Karsten
ICASSP
2011
IEEE
14 years 3 months ago
Convex approximation algorithms for back-pressure power control of wireless multi-hop networks
Cross-layer design and operation of wireless networks has attracted significant interest in the last decade, yet some basic problems in the area remain unsolved. In this paper, w...
Evaggelia Matskani, Nikos D. Sidiropoulos, Leandro...