Sciweavers

1078 search results - page 211 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
CHARME
2003
Springer
110views Hardware» more  CHARME 2003»
15 years 3 months ago
Exact and Efficient Verification of Parameterized Cache Coherence Protocols
Abstract. We propose new, tractably (in some cases provably) efficient algorithmic methods for exact (sound and complete) parameterized reasoning about cache coherence protocols. F...
E. Allen Emerson, Vineet Kahlon
EDBT
2010
ACM
164views Database» more  EDBT 2010»
15 years 3 months ago
Techniques for efficiently querying scientific workflow provenance graphs
A key advantage of scientific workflow systems over traditional scripting approaches is their ability to automatically record data and process dependencies introduced during workf...
Manish Kumar Anand, Shawn Bowers, Bertram Ludä...
CCS
2008
ACM
15 years 1 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
CSE
2009
IEEE
15 years 23 days ago
Time Critical Content Delivery Using Predictable Patterns in Mobile Social Networks
In Mobile Social Networks (MSN) individuals with similar interests or commonalities connect to each other using the mobile phones. MSN are special kind of Ad-hoc Networks in which ...
Fawad Nazir, Jianhua Ma, Aruna Seneviratne
TPDS
2008
116views more  TPDS 2008»
14 years 11 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...