Sciweavers

7380 search results - page 1252 / 1476
» Engineering Software Intensive Systems
Sort
View
ICFEM
2004
Springer
15 years 8 months ago
Learning to Verify Safety Properties
We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniqu...
Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gu...
129
Voted
EUROSYS
2010
ACM
15 years 8 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
COMPSAC
2009
IEEE
15 years 8 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
SEKE
2009
Springer
15 years 8 months ago
Improving Searchability of a Music Digital Library with Semantic Web Technologies
—Traditional search systems are usually based on keywords, a very simple and convenient mechanism to express a need for information. This is the most extended way of searching th...
Paloma de Juan, Carlos Angel Iglesias
EUMAS
2006
15 years 4 months ago
DimaX: A Fault-Tolerant Multi-Agent Platform
Fault tolerance is an important property of large-scale multiagent systems as the failure rate grows with both the number of the hosts and deployed agents, and the duration of com...
Nora Faci, Zahia Guessoum, Olivier Marin
« Prev « First page 1252 / 1476 Last » Next »