Sciweavers

303 search results - page 4 / 61
» Unifying Theories of Confidentiality
Sort
View
CORR
2008
Springer
211views Education» more  CORR 2008»
13 years 6 months ago
Competitive Design of Multiuser MIMO Systems based on Game Theory: A Unified View
Abstract--This paper considers the noncooperative maximization of mutual information in the Gaussian interference channel in a fully distributed fashion via game theory. This probl...
Gesualdo Scutari, Daniel Pérez Palomar, Ser...
ICDCS
2011
IEEE
12 years 5 months ago
The Routing Continuum from Shortest-Path to All-Path: A Unifying Theory
—Routing is a critical operation in networks. In the context of data and sensor networks, routing strategies such as shortest-path, multi-path and potential-based (“all-path”...
Yanhua Li, Zhi-Li Zhang, Daniel Boley
DBPL
2003
Springer
120views Database» more  DBPL 2003»
13 years 11 months ago
A Unifying Semantics for Active Databases Using Non-Markovian Theories of Actions
Over the last fifteen years, database management systems (DBMSs) have been enhanced by the addition of rule-based programming to obtain active DBMSs. One of the greatest challeng...
Iluju Kiringa, Raymond Reiter
ISIPTA
2005
IEEE
151views Mathematics» more  ISIPTA 2005»
13 years 12 months ago
Towards a Unifying Theory of Logical and Probabilistic Reasoning
Logic and probability theory have both a long history in science. They are mainly rooted in philosophy and mathematics, but are nowadays important tools in many other fields such...
Rolf Haenni
FM
2003
Springer
88views Formal Methods» more  FM 2003»
13 years 11 months ago
A Semantic Foundation for TCOZ in Unifying Theories of Programming
Abstract. UnifyingTheoriesofProgramming(UTP)canprovideaformalsemantic foundation not only for programming languages but also for more expressive specification languages. We believ...
Shengchao Qin, Jin Song Dong, Wei-Ngan Chin