Sciweavers

1161 search results - page 122 / 233
» Kinetic Dependence Graphs
Sort
View
119
Voted
CCS
2007
ACM
15 years 6 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
FASE
2005
Springer
15 years 6 months ago
Kaveri: Delivering the Indus Java Program Slicer to Eclipse
This tool paper describes a modular program slicer for Java built using the Indus program analysis framework along with it’s Eclipse-based user interface called Kaveri. Indus pro...
Ganeshan Jayaraman, Venkatesh Prasad Ranganath, Jo...
67
Voted
ICDCS
2003
IEEE
15 years 6 months ago
The Hash History Approach for Reconciling Mutual Inconsistency
We introduce the hash history mechanism for capturing dependencies among distributed replicas. Hash histories, consisting of a directed graph of version hashes, are independent of...
ByungHoon Kang, Robert Wilensky, John Kubiatowicz
98
Voted
ATAL
2003
Springer
15 years 6 months ago
Emergent properties of referral systems
Agents must decide with whom to interact, which is nontrivial when no central directories are available. A classical decentralized approach is referral systems, where agents adapt...
Pinar Yolum, Munindar P. Singh
105
Voted
CONCUR
2003
Springer
15 years 6 months ago
Priority Rewrite Systems for OSOS Process Languages
We propose an algorithm for generating a Priority Rewrite System (PRS) for an arbitrary process language in the OSOS format such that rewriting of process terms is sound for bisim...
Irek Ulidowski