Sciweavers

2150 search results - page 303 / 430
» On a restricted cross-intersection problem
Sort
View
GCC
2003
Springer
15 years 3 months ago
Dominating-Set-Based Searching in Peer-to-Peer Networks
— The peer-to-peer network for sharing information and data through direct exchange has emerged rapidly in recent years. The searching problem is a basic issue that addresses the...
Chunlin Yang, Jie Wu
GI
2003
Springer
15 years 3 months ago
Active Data Protection with Data Journals
: A major privacy problem on the internet is the unrestricted sharing of user data between services and other parties. The EU privacy legislation grants the user the rights to rest...
Lars Brückner, Jan Steffan, Wesley Terpstra, ...
ICLP
2003
Springer
15 years 3 months ago
Uniform Equivalence of Logic Programs under the Stable Model Semantics
In recent research on nonmonotonic logic programming, repeatedly strong equivalence of logic programs P and Q has been considered, which holds if the programs P ∪ R and Q ∪ R h...
Thomas Eiter, Michael Fink
SAC
2010
ACM
15 years 3 months ago
An algorithm to generate the context-sensitive synchronized control flow graph
The verification of industrial systems specified with CSP often implies the analysis of many concurrent and synchronized components. The cost associated to these analyses is usu...
Marisa Llorens, Javier Oliver, Josep Silva, Salvad...
ACSAC
2002
IEEE
15 years 3 months ago
A Secure Directory Service based on Exclusive Encryption
We describe the design of a Windows file-system directory service that ensures the persistence, integrity, privacy, syntactic legality, and case-insensitive uniqueness of the name...
John R. Douceur, Atul Adya, Josh Benaloh, William ...