Sciweavers

10 search results - page 2 / 2
» The Logic of Propagation in the Inscape Environment
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 7 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
ECAI
1994
Springer
13 years 10 months ago
Combining the Lazy Label Evaluation with Focusing Techniques in an ATMS
For large problems the ATMS often becomes the main resource consumer in any reasoning system. We propose an architecture (the 2vATMS) that combines the advantages of two techniques...
Mugur M. Tatar
OSDI
2004
ACM
14 years 6 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
ASUNAM
2009
IEEE
14 years 23 days ago
Dynamics of Inter-Meeting Time in Human Contact Networks
—We envision new communication paradigms, using physical dynamic interconnectedness among people. Delay Tolerant Networks (DTNs) are a new communication paradigm to support such ...
Eiko Yoneki, Dan Greenfield, Jon Crowcroft
JUCS
2008
138views more  JUCS 2008»
13 years 6 months ago
Schema Mappings and Agents' Actions in P2P Data Integration System
: We propose specification of schema mappings and agents' actions in XML data integration task. We discuss the problem in a highly-dynamic environment consisting of a communit...
Grazyna Brzykcy, Jerzy Bartoszek, Tadeusz Pankowsk...