Sciweavers

1134 search results - page 129 / 227
» Distributed Proving in Access-Control Systems
Sort
View
122
Voted
SIGMETRICS
2010
ACM
174views Hardware» more  SIGMETRICS 2010»
15 years 1 months ago
Decomposition results for an m/m/k with staggered setup
In this paper, we consider an M/M/k queueing system with setup costs. Servers are turned off when there is no work to do, but turning on an off server incurs a setup cost. The s...
Anshul Gandhi, Mor Harchol-Balter, Ivo Adan
175
Voted
OTM
2005
Springer
15 years 9 months ago
An Hybrid Intermediation Architectural Approach for Integrating Cross-Organizational Services
Nowadays, workflow research has shifted from fundamentals of workflow modelling and enactment towards improvement of the workflow modelling lifecycle and integration of workflow en...
Giannis Verginadis, Panagiotis Gouvas, Gregoris Me...
108
Voted
HICSS
1994
IEEE
95views Biometrics» more  HICSS 1994»
15 years 7 months ago
On-Line Detection and Resolution of Communication Deadlocks
We present a new distributed algorithm that detects and resolves communication deadlocks on-line, i.e., simultaneously detects and resolves deadlock as communication requests are ...
Wee Keong Ng, Chinya V. Ravishankar
SAC
2010
ACM
15 years 10 months ago
Maintaining data reliability without availability in P2P storage systems
Peer-to-peer (P2P) storage is a promising technology to provide users with cheap and online persistence. However, due the instability of these infrastructures, P2P storage systems...
Lluis Pamies-Juarez, Pedro García Ló...
145
Voted
PODC
2012
ACM
13 years 6 months ago
Iterative approximate byzantine consensus in arbitrary directed graphs
This paper proves a necessary and sufficient condition for the existence of iterative algorithms that achieve approximate Byzantine consensus in arbitrary directed graphs, where e...
Nitin H. Vaidya, Lewis Tseng, Guanfeng Liang