Sciweavers

3134 search results - page 207 / 627
» simulation 2010
Sort
View
146
Voted
FGCS
2010
108views more  FGCS 2010»
15 years 2 months ago
The wandering token: Congestion avoidance of a shared resource
In a distributed system where scalability is an issue, like in a GRID [5], the problem of enforcing mutual exclusion often arises in a soft form: the infrequent failure of the mut...
Augusto Ciuffoletti
COMGEO
2010
ACM
15 years 15 days ago
Implementing a Bayesian approach to criminal geographic profiling
The geographic profiling problem is to create an operationally useful estimate of the location of the home base of a serial criminal from the known locations of the offense sites....
Mike O'Leary
166
Voted
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 10 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
118
Voted
EOR
2006
104views more  EOR 2006»
15 years 3 months ago
Link function selection in stochastic multicriteria decision making models
A stochastic formulation of the Analytic Hierarchy Process (AHP) using an approach based on Bayesian categorical data models has been developed. However, in categorical data model...
Eugene D. Hahn
117
Voted
ENTCS
2000
112views more  ENTCS 2000»
15 years 3 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato