Sciweavers

963 search results - page 179 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
GROUP
2009
ACM
15 years 6 months ago
Lazy scheduling of processing and transmission tasks in collaborative systems
A collaborative system must perform both processing and transmission tasks. We present a policy for scheduling these tasks on a single core that is inspired by studies of human pe...
Sasa Junuzovic, Prasun Dewan
CODES
2007
IEEE
15 years 6 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...
LPAR
2007
Springer
15 years 6 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 5 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 4 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...