Sciweavers

754 search results - page 149 / 151
» Can self-managed systems be trusted
Sort
View
HPDC
2003
IEEE
14 years 1 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
PLDI
2010
ACM
13 years 12 months ago
Bringing Extensibility to Verified Compilers
Verified compilers, such as Leroy's CompCert, are accompanied by a fully checked correctness proof. Both the compiler and proof are often constructed with an interactive proo...
Zachary Tatlock, Sorin Lerner
ICDCS
2010
IEEE
13 years 11 months ago
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
—There are several analytical results on distributed hash tables (DHTs) that can tolerate Byzantine faults. Unfortunately, in such systems, operations such as data retrieval and ...
Maxwell Young, Aniket Kate, Ian Goldberg, Martin K...
ECAI
2006
Springer
13 years 11 months ago
Agents with Anticipatory Behaviors: To Be Cautious in a Risky Environment
This work presents some anticipatory mechanisms in an agent architecture, modeling affective behaviours as effects of surprise. Through experiment discussion, the advantages of bec...
Cristiano Castelfranchi, Rino Falcone, Michele Piu...
AVI
2010
13 years 9 months ago
iChase: supporting exploration and awareness of editing activities on Wikipedia
To increase its credibility and preserve the trust of its readers, Wikipedia needs to ensure a good quality of its articles. To that end, it is critical for Wikipedia administrato...
Nathalie Henry Riche, Bongshin Lee, Fanny Chevalie...