Sciweavers

4356 search results - page 133 / 872
» Communicating Transactions - (Extended Abstract)
Sort
View
P2P
2008
IEEE
15 years 4 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
POLICY
2007
Springer
15 years 4 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 1 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
DBSEC
2000
94views Database» more  DBSEC 2000»
14 years 11 months ago
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
In this paper, we present a fair-exchange electronic commerce (e-commerce) protocol, based on using an online trusted third party, that ensures fairness and prevents any party fro...
Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamu...
FTCS
1998
91views more  FTCS 1998»
14 years 11 months ago
How Fail-Stop are Faulty Programs?
Most fault-tolerant systems are designed to stop faulty programs before they write permanent data or communicate with other processes. This property (halt-on-failure) forms the co...
Subhachandra Chandra, Peter M. Chen