Sciweavers

423 search results - page 26 / 85
» On Term Rewriting Systems Having a Rational Derivation
Sort
View
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 2 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
P2P
2007
IEEE
146views Communications» more  P2P 2007»
15 years 4 months ago
Modelling Real P2P Networks: The Effect of Altruism
We develop a model of the interaction of rational peers in an incentive-free Peer-to-Peer (P2P) network and use game theoretic analysis to derive results about peer and network be...
Dimitrios K. Vassilakis, Vasilis Vassalos
ECSQARU
2001
Springer
15 years 2 months ago
Social Choice, Merging, and Elections
Abstract. Intelligent agents have to be able to merge inputs received from different sources in a coherent and rational way. Recently, several proposals have been made for the merg...
Thomas Andreas Meyer, Aditya Ghose, Samir Chopra
KBSE
2005
IEEE
15 years 3 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
ESORICS
2004
Springer
15 years 3 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ...
Jon A. Solworth, Robert H. Sloan