Sciweavers

201 search results - page 28 / 41
» On the Decidability of Model-Checking for P Systems
Sort
View
RTA
2007
Springer
15 years 5 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
MIDDLEWARE
2007
Springer
15 years 5 months ago
AVMEM - Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems
Monitoring and management operations that query nodes based on their availability can be extremely useful in a variety of largescale distributed systems containing hundreds to thou...
Ramsés Morales, Brian Cho, Indranil Gupta
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 6 months ago
An Observational Study of Voters on the Internet
Voters in a democracy have the responsibility to learn about the candidates and issues on which they are deciding. The internet offers voters unparalleled opportunities for findin...
Scott P. Robertson, Christine E. Wania, Sang Joon ...
P2P
2007
IEEE
156views Communications» more  P2P 2007»
15 years 6 months ago
Completeness Estimation of Range Queries in Structured Overlays
Range queries are a very powerful tool in a wide range of data management systems and are vital to a multitude of applications. The hierarchy of structured overlay systems can be ...
Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt
ATAL
2003
Springer
15 years 4 months ago
Emergent properties of referral systems
Agents must decide with whom to interact, which is nontrivial when no central directories are available. A classical decentralized approach is referral systems, where agents adapt...
Pinar Yolum, Munindar P. Singh