Sciweavers

3793 search results - page 519 / 759
» The wireless synchronization problem
Sort
View
MP
2002
85views more  MP 2002»
15 years 3 months ago
From fluid relaxations to practical algorithms for job shop scheduling: the makespan objective
We design an algorithm, called the fluid synchronization algorithm (FSA), for the job shop scheduling problem with the objective of minimizing the makespan. We round an optimal sol...
Dimitris Bertsimas, Jay Sethuraman
IEEEARES
2010
IEEE
15 years 2 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
PERCOM
2006
ACM
16 years 3 months ago
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems aris...
Ulrike Meyer, Susanne Wetzel
PERCOM
2004
ACM
16 years 3 months ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
MOBIHOC
2001
ACM
16 years 3 months ago
The quest for security in mobile ad hoc networks
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...