Sciweavers

2517 search results - page 113 / 504
» Specifying Weak Sets
Sort
View
SIAMNUM
2010
114views more  SIAMNUM 2010»
15 years 6 days ago
Computing Multivariate Fekete and Leja Points by Numerical Linear Algebra
We discuss and compare two greedy algorithms, that compute discrete versions of Fekete-like points for multivariate compact sets by basic tools of numerical linear algebra. The fi...
Len Bos, Stefano De Marchi, Alvise Sommariva, Marc...
COMSUR
2011
218views Hardware» more  COMSUR 2011»
14 years 5 months ago
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)
Abstract—Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult. The challenge is to effectively exchange keys w...
Vijay K. Gurbani, Vladimir Kolesnikov
POLICY
2009
Springer
16 years 14 hour ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...
IAT
2006
IEEE
15 years 11 months ago
A Human-Friendly MAS for Mining Stock Data
Mining stock data can be beneficial to the participants and researchers in the stock market. However, it is very difficult for a normal trader or researcher to apply data mining...
Jiarui Ni, Chengqi Zhang
JELIA
2004
Springer
15 years 10 months ago
Games for Cognitive Agents
Strategic games model the interaction among simultaneous decisions of agents. The starting point of strategic games is a set of players (agents) having strategies (decisions) and p...
Mehdi Dastani, Leendert W. N. van der Torre