Sciweavers

368 search results - page 46 / 74
» System BV is NP-complete
Sort
View
ADHOC
2007
137views more  ADHOC 2007»
14 years 9 months ago
"MeshUp": Self-organizing mesh-based topologies for next generation radio access networks
The phenomenal growth in wireless technologies has brought about a slew of new services. Incumbent with the new technology is the challenge of providing flexible, reconfigurable...
Samik Ghosh, Kalyan Basu, Sajal K. Das
CN
2007
106views more  CN 2007»
14 years 9 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
INFSOF
2006
73views more  INFSOF 2006»
14 years 9 months ago
Theory and algorithms for slicing unstructured programs
Program slicing identifies parts of a program that potentially affect a chosen computation. It has many applications in software engineering, including maintenance, evolution and ...
Mark Harman, Arun Lakhotia, David Binkley
EOR
2007
80views more  EOR 2007»
14 years 9 months ago
A partition approach to the inventory/routing problem
In this study we focus on the integration of inventory control and vehicle routing schedules for a distribution system in which the warehouse is responsible for the replenishment ...
Qiu-Hong Zhao, Shouyang Wang, Kin Keung Lai
MAM
2006
95views more  MAM 2006»
14 years 9 months ago
A selective DVS technique based on battery residual
Conventional research on DVS assumes that the battery, which is the power source of most mobile devices, provides constant power; the battery, however, has unique discharge charac...
Sukwon Choi, Hojung Cha, Rhan Ha