Sciweavers

2386 search results - page 261 / 478
» Database Security 2000
Sort
View
AGENTS
2000
Springer
15 years 2 months ago
A game-theoretic formulation of multi-agent resource allocation
This paper considers resource allocation in a network with mobile agents competing for computational priority. We formulate this problem as a multi-agent game with the players bei...
Jonathan Bredin, Rajiv T. Maheswaran, Çagri...
OOPSLA
2000
Springer
15 years 2 months ago
An efficient class and object encoding
An object encoding translates a language with object primitives to one without. Similarly, a class encoding translates classes into other primitives. Both are important theoretica...
Neal Glew
POPL
2000
ACM
15 years 2 months ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim
SAFECOMP
2000
Springer
15 years 2 months ago
Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems
Increasingly, the dependability of vehicle based programmable systems is becoming a key feature in ensuring the safety of those in and around the vehicle. The goal of those respons...
Richard Evans, Jonathan D. Moffett
SAFECOMP
2000
Springer
15 years 2 months ago
The Safety Management of Data-Driven Safety-Related Systems
Many safety-related systems are built from generic software which is customised to work in a particular situation by static configuration data. Examples of such systems are railwa...
A. G. Faulkner, P. A. Bennett, R. H. Pierce, I. H....