Sciweavers

2814 search results - page 68 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
COCO
2008
Springer
97views Algorithms» more  COCO 2008»
15 years 6 months ago
Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems
A central question in quantum information theory and computational complexity is how powerful nonlocal strategies are in cooperative games with imperfect information, such as mult...
Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xi...
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 11 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
DAGSTUHL
2009
15 years 5 months ago
Using Architecture Models to Support the Generation and Operation of Component-Based Adaptive Systems
Modelling architectural information is particularly important because of the acknowledged crucial role of software architecture in raising the level of abstraction during developme...
Nelly Bencomo, Gordon S. Blair
SIGMETRICS
2011
ACM
245views Hardware» more  SIGMETRICS 2011»
14 years 7 months ago
Record and transplay: partial checkpointing for replay debugging across heterogeneous systems
Software bugs that occur in production are often difficult to reproduce in the lab due to subtle differences in the application environment and nondeterminism. To address this pr...
Dinesh Subhraveti, Jason Nieh
SACMAT
2010
ACM
15 years 9 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum