Sciweavers

33 search results - page 6 / 7
» Knowledge-based modelling of voting protocols
Sort
View
IPPS
2007
IEEE
13 years 11 months ago
Availability/Consistency Balancing Replication Model
Replication combined with explicit management of data integrity constraints can be used to enhance availability of object-oriented, data-centric distributed systems when node and ...
Johannes Osrael, Lorenz Froihofer, Karl M. Gö...
FORTE
2009
13 years 2 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
EMS
2009
IEEE
13 years 11 months ago
Modelling Periodic Data Dissemination in Wireless Sensor Networks
—Epidemic-based communications, or “gossiping”, provides a robust and scalable method for maintaining a knowledge base in a sensor network faced with an unpredictable network...
Graham Williamson, Davide Cellai, Simon A. Dobson,...
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
13 years 9 months ago
The unavailable candidate model: a decision-theoretic view of social choice
One of the fundamental problems in the theory of social choice is aggregating the rankings of a set of agents (or voters) into a consensus ranking. Rank aggregation has found appl...
Tyler Lu, Craig Boutilier
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...