Sciweavers

1926 search results - page 149 / 386
» From P to MP Systems
Sort
View
KBSE
2007
IEEE
15 years 4 months ago
Synthesis of test purpose directed reactive planning tester for nondeterministic systems
We describe a model-based construction of an online tester for black-box testing of implementation under test (IUT). The external behavior of the IUT is modeled as an output obser...
Jüri Vain, Kullo Raiend, Andres Kull, Juhan P...
P2P
2009
IEEE
15 years 4 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...
93
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
EDBTW
2006
Springer
15 years 1 months ago
Data Stream Sharing
Abstract. Recent research efforts in the fields of data stream processing and data stream management systems (DSMSs) show the increasing importance of processing data streams, e. g...
Richard Kuntschke, Alfons Kemper
BIRTHDAY
2010
Springer
14 years 11 months ago
Halting and Equivalence of Program Schemes in Models of Arbitrary Theories
In this note we consider the following decision problems. Let be a fixed first-order signature. (i) Given a first-order theory or ground theory T over of Turing degree , a program...
Dexter Kozen