Sciweavers

403 search results - page 42 / 81
» An algebra for commitment protocols
Sort
View
ENTCS
2006
146views more  ENTCS 2006»
14 years 12 months ago
Formalizing WSBPEL Business Processes Using Process Algebra
Industry standards for Web Service composition, such as WSBPEL, provide the notation and additional control mechanisms for the execution of business processes in Web Service colla...
Javier Cámara, Carlos Canal, Javier Cubo, A...
SACRYPT
2004
Springer
15 years 5 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
USENIX
1994
15 years 1 months ago
Improving the Write Performance of an NFS Server
The Network File System (NFS) utilizes a stateless protocol between clients and servers; the major advantage of this statelessness is that NFS crash recovery is very easy. However...
Chet Juszczak
ATAL
2011
Springer
13 years 11 months ago
Specifying and applying commitment-based business patterns
Recent work in communications and business modeling emphasizes a commitment-based view of interaction. By abstracting away from implementation-level details, commitments can poten...
Amit K. Chopra, Munindar P. Singh
INTERNET
2006
149views more  INTERNET 2006»
14 years 11 months ago
Concurrent Multiple-Issue Negotiation for Internet-Based Services
Negotiation is a technique for reaching mutually beneficial agreement among autonomous entities. A concurrent negotiation problem occurs when one entity is negotiating simultaneous...
Jiangbo Dang, Michael N. Huhns