Login / Signup

A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks.

Frank Yeong-Sung LinPo-Hao TsangKun-Dao Jiang
Published in: CIS (1) (2008)
Keyphrases
  • malicious attacks
  • allocation strategy
  • allocation strategies
  • peer to peer
  • bidding strategies