Sciweavers

245 search results - page 2 / 49
» The Iterated Weakest Link
Sort
View
ENTCS
2006
133views more  ENTCS 2006»
14 years 9 months ago
Linking Semantic Models to Support CSP || B Consistency Checking
Consistency checking in the CSP B approach verifies that an individual controller process, defined using a sequential non-divergent subset of CSP, never calls a B operation outsid...
Neil Evans, Helen Treharne
GLOBECOM
2009
IEEE
15 years 4 months ago
Multihop MIMO Relay Networks with ARQ
—A multiple antenna multihop relay network consisting of a source, a relay, and a destination node, is considered. The diversity-multiplexing-delay tradeoffs (DMDT) for various m...
Yao Xie, Deniz Gündüz, Andrea J. Goldsmi...
98
Voted
OPODIS
2007
14 years 11 months ago
Byzantine Consensus with Few Synchronous Links
This paper tackles the consensus problem in asynchronous systems prone to byzantine failures. One way to circumvent the FLP impossibility result consists in adding synchrony assump...
Moumen Hamouma, Achour Mostéfaoui, Gilles T...
ESWS
2011
Springer
14 years 1 months ago
Zero-Knowledge Query Planning for an Iterator Implementation of Link Traversal Based Query Execution
Abstract. Link traversal based query execution is a new query execution paradigm for the Web of Data. This approach allows the execution engine to discover potentially relevant dat...
Olaf Hartig
76
Voted
NSDI
2008
14 years 11 months ago
Predicted and Observed User Behavior in the Weakest-link Security Game
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Jens Grossklags, Nicolas Christin, John Chuang