Sciweavers

2335 search results - page 342 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
127
Voted
CCGRID
2003
IEEE
15 years 7 months ago
A-peer: An Agent Platform Integrating Peer-to-Peer Network
Peer-to-Peer (p2p), as an emerging technology, is exerting huge influence on various application scenarios. Meanwhile, agents, assisting applications in traditional paradigm with...
Tieyan Li, Zhi-Gang Zhao, Si-Zhen Yo
SIGSOFT
2004
ACM
16 years 2 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...
CIKM
2009
Springer
15 years 6 months ago
A novel approach for privacy mining of generic basic association rules
Data mining can extract important knowledge from large data collections - but sometimes these collections are split among various parties. Privacy concerns may prevent the parties...
Moez Waddey, Pascal Poncelet, Sadok Ben Yahia
126
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks
Mobile ad-hoc networks with their arbitrary topologies are a difficult domain for providing highly available Web services. Since hosts can move unpredictably, finding services a...
Lukasz Juszczyk, Jaroslaw Lazowski, Schahram Dustd...
RIDE
1999
IEEE
15 years 6 months ago
Specification of Cooperative Constraints in Virtual Enterprise Workflow
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Anne H. H. Ngu