Sciweavers

805 search results - page 129 / 161
» On the Semantics of Conditional Commitment
Sort
View
ACSC
2009
IEEE
15 years 8 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
FOSSACS
2009
Springer
15 years 8 months ago
Coalgebraic Hybrid Logic
Abstract. We introduce a generic framework for hybrid logics, i.e. modal logics additionally featuring nominals and satisfaction operators, thus providing the necessary facilities ...
Rob Myers, Dirk Pattinson, Lutz Schröder
SEFM
2009
IEEE
15 years 8 months ago
Adjusted Verification Rules for Loops Are More Complete and Give Better Diagnostics for Less
—Increasingly, tools and their underlying theories are able to cope with “real code” written as part of industrial grade applications almost as is. It has been our experience...
Patrice Chalin
NCA
2009
IEEE
15 years 8 months ago
Introducing Virtual Execution Environments for Application Lifecycle Management and SLA-Driven Resource Distribution within Serv
Abstract—Resource management is a key challenge that service providers must adequately face in order to ensure their profitability. This paper describes a proof-of-concept frame...
Iñigo Goiri, Ferran Julià, Jorge Eja...
MODELS
2009
Springer
15 years 8 months ago
Dead or Alive: finding zombie features in the Linux kernel
Variability management in operating systems is an errorprone and tedious task. This is especially true for the Linux operating system, which provides a specialized tool called Kco...
Reinhard Tartler, Julio Sincero, Wolfgang Schr&oum...