Sciweavers

4218 search results - page 532 / 844
» Complete sets of cooperations
Sort
View
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
16 years 1 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
CHI
2010
ACM
15 years 11 months ago
Social network activity and social well-being
Previous research has shown a relationship between use of social networking sites and feelings of social capital. However, most studies have relied on self-reports by college stud...
Moira Burke, Cameron Marlow, Thomas M. Lento
IEEECIT
2009
IEEE
15 years 11 months ago
A Highly Efficient Inter-domain Communication Channel
—With virtual machine technology, distributed services deployed in multiple cooperative virtual machines, such as multi-tier web services, may reside on one physical machine. Thi...
Hongyong Zang, Kuiyan Gu, Yaqiong Li, Yuzhong Sun,...
ATAL
2009
Springer
15 years 11 months ago
Stable multi-project scheduling of airport ground handling services by heterogeneous agents
This paper addresses decentralized multi-project scheduling under uncertainty. The problem instance we study is the scheduling of airport ground handling services, where aircraft ...
Xiaoyu Mao, Nico Roos, Alfons H. Salden
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell