Sciweavers

279 search results - page 26 / 56
» A Name Abstraction Functor for Named Sets
Sort
View
APCCM
2009
13 years 10 months ago
Multi-Level Domain Modeling with M-Objects and M-Relationships
Using traditional semantic data modeling, multi-level modeling can be achieved by representing objects in different abstraction hierarchies, namely classification, aggregation and...
Bernd Neumayr, Katharina Grün, Michael Schref...
ATVA
2009
Springer
172views Hardware» more  ATVA 2009»
14 years 3 months ago
Symbolic CTL Model Checking of Asynchronous Systems Using Constrained Saturation
Abstract. The saturation state-space generation algorithm has demonstrated clear improvements over state-of-the-art symbolic methods for asynchronous systems. This work is motivate...
Yang Zhao, Gianfranco Ciardo
FSEN
2009
Springer
14 years 3 months ago
The Complexity of Reachability in Randomized Sabotage Games
Abstract. We analyze a model of fault-tolerant systems in a probabilistic setting. The model has been introduced under the name of “sabotage games”. A reachability problem over...
Dominik Klein, Frank G. Radmacher, Wolfgang Thomas
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 1 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
LATINCRYPT
2010
13 years 7 months ago
On the Impossibility of Batch Update for Cryptographic Accumulators
Abstract. A cryptographic accumulator is a scheme where a set of elements is represented by a single short value. This value, along with another value called witness, allows to pro...
Philippe Camacho, Alejandro Hevia