Sciweavers

2468 search results - page 325 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
133
Voted
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 6 months ago
Querying contract databases based on temporal behavior
Considering a broad definition for service contracts (beyond web services and software, e.g. airline tickets and insurance policies), we tackle the challenges of building a high ...
Elio Damaggio, Alin Deutsch, Dayou Zhou
142
Voted
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
SOFTVIS
2005
ACM
15 years 9 months ago
Visualization of mobile object environments
This paper presents a system for visualizing mobile object frameworks. In such frameworks, the objects can migrate to remote hosts, along with their state and behavior, while the ...
Yaniv Frishman, Ayellet Tal
USENIX
2003
15 years 5 months ago
A Cooperative Internet Backup Scheme
We present a novel peer-to-peer backup technique that allows computers connected to the Internet to back up their data cooperatively: Each computer has a set of partner computers,...
Mark Lillibridge, Sameh Elnikety, Andrew Birrell, ...
AAMAS
2007
Springer
15 years 4 months ago
Local strategy learning in networked multi-agent team formation
Abstract. Networked multi-agent systems are comprised of many autonomous yet interdependent agents situated in a virtual social network. Two examples of such systems are supply cha...
Blazej Bulka, Matthew E. Gaston, Marie desJardins