Sciweavers

648 search results - page 88 / 130
» Using Criticalities as a Heuristic for Answer Set Programmin...
Sort
View
INFOCOM
2010
IEEE
14 years 9 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
INFOCOM
2010
IEEE
14 years 9 months ago
Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio Networks
Recently, a cooperative paradigm for single-channel cognitive radio networks has been advocated, where primary users can leverage secondary users to relay their traffic. However, i...
Hong Xu, Baochun Li
APPROX
2009
Springer
105views Algorithms» more  APPROX 2009»
14 years 8 months ago
Real-Time Message Routing and Scheduling
Abstract. Exchanging messages between nodes of a network (e.g., embedded computers) is a fundamental issue in real-time systems involving critical routing and scheduling decisions....
Ronald Koch, Britta Peis, Martin Skutella, Andreas...
ISLPED
2000
ACM
97views Hardware» more  ISLPED 2000»
15 years 3 months ago
Achieving utility arbitrarily close to the optimal with limited energy
Energy is one of the limited resources for modern systems, especially the battery-operated devices and personal digital assistants. The backlog in new technologies for more powerf...
Gang Qu, Miodrag Potkonjak
TPLP
2002
117views more  TPLP 2002»
14 years 10 months ago
On Properties of Update Sequences Based on Causal Rejection
In this paper, we consider an approach to update nonmonotonic knowledge bases represented as extended logic programs under the answer set semantics. In this approach, new informat...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...