Sciweavers

2436 search results - page 339 / 488
» Comonadic Notions of Computation
Sort
View
ICTAC
2010
Springer
15 years 3 months ago
A Modality for Safe Resource Sharing and Code Reentrancy
Abstract. The potential of linear logic in facilitating reasoning on resource usage has long been recognized. However, convincing uses of linear types in practical programming are ...
Rui Shi, Dengping Zhu, Hongwei Xi
IEEESCC
2010
IEEE
15 years 3 months ago
A Service Packaging Platform for Delivering Services
—For a service to be used in a commercial setting, certain service delivery functions such as monitoring, billing, authentication, etc need to be packaged with the service. Becau...
Muhammad Adeel Talib, Alan W. Colman, Jun Han, Jus...
PERCOM
2010
ACM
15 years 2 months ago
Gateway designation for timely communications in instant mesh networks
In this paper, we explore how to effectively create and use "instant mesh networks", i.e., wireless mesh networks that are dynamically deployed in temporary circumstances...
Bo Xing, Mayur Deshpande, Sharad Mehrotra, Nalini ...
154
Voted
SAGT
2010
Springer
191views Game Theory» more  SAGT 2010»
15 years 2 months ago
Complexity of Safe Strategic Voting
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a pot...
Noam Hazon, Edith Elkind
TC
2010
15 years 2 months ago
Formal Reliability Analysis Using Theorem Proving
—Reliability analysis has become a tool of fundamental importance to virtually all electrical and computer engineers because of the extensive usage of hardware systems in safety ...
Osman Hasan, Sofiène Tahar, Naeem Abbasi