Sciweavers

1716 search results - page 190 / 344
» Proving Conditional Termination
Sort
View
126
Voted
CSCWD
2001
Springer
15 years 5 months ago
Modeling Workflow within Distributed Systems
Workflow management techniques are aiming at supporting business process across organization boundaries. Current techniques are lacking of the formalism tools to model and analyze...
Yuhong Yan, Alex Bejan
112
Voted
PODS
2000
ACM
112views Database» more  PODS 2000»
15 years 5 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
102
Voted
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 5 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
ISAAC
1998
Springer
66views Algorithms» more  ISAAC 1998»
15 years 5 months ago
A Parallel Algorithm for Sampling Matchings from an Almost Uniform Distribution
In this paper we present a randomized parallel algorithm to sample matchings from an almost uniform distribution on the set of matchings of all sizes in a graph. First we prove th...
Josep Díaz, Jordi Petit, Panagiotis Psychar...
100
Voted
SOFSEM
1998
Springer
15 years 5 months ago
Some Results on the Modelling of Spatial Data
Abstract. Formal methods based on the mathematical theory of partially ordered sets (i.e., posets) have been used in the database field for the modelling of spatial data since many...
Luca Forlizzi, Enrico Nardelli