Sciweavers

1471 search results - page 254 / 295
» Composing concurrency control
Sort
View
EUROPKI
2006
Springer
15 years 1 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
ICSE
2000
IEEE-ACM
15 years 1 months ago
Dragonfly: linking conceptual and implementation architectures of multiuser interactive systems
Software architecture styles for developing multiuser applications are usually defined at a conceptual level, abstracting such low-level issues of distributed implementation as co...
Gary E. Anderson, T. C. Nicholas Graham, Timothy N...
CP
1995
Springer
15 years 1 months ago
Asynchronous Weak-commitment Search for Solving Distributed Constraint Satisfaction Problems
A distributed constraint satisfaction problem (Distributed CSP) is a CSP in which variables and constraints are distributed among multiple automated agents, and various application...
Makoto Yokoo
VLDB
1995
ACM
87views Database» more  VLDB 1995»
15 years 1 months ago
Redo Recovery after System Crashes
: This paper defines a framework for explaining redo recovery after a system crash. In this framework, an installation graph explains the order in which operations must be install...
David B. Lomet, Mark R. Tuttle
AIPS
2008
15 years 2 days ago
A Probabilistic Planner for the Combat Power Management Problem
We present a planner for the Combat Power Management (CPM) problem. In response to multiple simultaneous or sequential threats, the planner generates a set of local plans, one for...
Abder Rezak Benaskeur, Froduald Kabanza, Eric Beau...