Sciweavers

4196 search results - page 495 / 840
» Supporting the development of network programs
Sort
View
IOR
2010
114views more  IOR 2010»
15 years 3 months ago
Inventory Management of a Fast-Fashion Retail Network
Working in collaboration with Spain-based retailer Zara, we address the problem of distributing over time a limited amount of inventory across all the stores in a fast-fashion ret...
Felipe Caro, Jérémie Gallien
WISEC
2010
ACM
16 years 18 hour ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
15 years 3 months ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...
ICNSC
2008
IEEE
15 years 11 months ago
Robust Variance Constrained Filter Design for Systems with Non-Gaussian Noises
In this paper, a variance constrained filtering problem is considered for systems with both non-Gaussian noises and polytopic uncertainty. A novel filter is developed to estimate t...
Fuwen Yang, Yongmin Li, Xiaohui Liu
142
Voted
JASIS
2006
108views more  JASIS 2006»
15 years 5 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...