Sciweavers

1833 search results - page 78 / 367
» Mechanized Verification with Sharing
Sort
View
AP2PC
2003
Springer
15 years 6 months ago
Agent-Based Social Assessment of Shared Resources
Prior to the access to decentralized resources like web services and shared files in peer-to-peer networks, the user needs to be provided with accurate information about these res...
Matthias Nickles, Gerhard Weiß
97
Voted
AINA
2004
IEEE
15 years 4 months ago
Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng...
92
Voted
DBSEC
2008
129views Database» more  DBSEC 2008»
15 years 2 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
124
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 10 months ago
Power Allocation and Spectrum Sharing in Multi-User, Multi-Channel Systems with Strategic Users
We consider the decentralized power allocation and spectrum sharing problem in multi-user, multichannel systems with strategic users. We present a mechanism/game form that has the...
Ali Kakhbod, Demosthenis Teneketzis
93
Voted
WOTUG
2008
15 years 2 months ago
Solving the Santa Claus Problem: a Comparison of Various Concurrent Programming Techniques
Abstract. The Santa Claus problem provides an excellent exercise in concurrent programming and can be used to show the simplicity or complexity of solving problems using a particul...
Jason Hurt, Jan Bækgaard Pedersen