Sciweavers

283 search results - page 41 / 57
» Coordination-Policy Based Composed System Behavior Derivatio...
Sort
View
TC
1998
13 years 8 months ago
Propagating Integrity Information among Interrelated Databases
Data integrity policies often require that quality and integrity metadata be generated and communicated to potential users. However, in data warehouses, federations, and other mul...
Arnon Rosenthal, Edward Sciore
TACAS
2004
Springer
139views Algorithms» more  TACAS 2004»
14 years 22 days ago
Error Explanation with Distance Metrics
Abstract In the event that a system does not satisfy a specification, a model checker will typically automatically produce a counterexample trace that shows a particular instance ...
Alex Groce
ICRA
1999
IEEE
89views Robotics» more  ICRA 1999»
13 years 11 months ago
Failure Tolerant Teleoperation of a Kinematically Redundant Manipulator: An Experimental Study
Teleoperated robots in harsh environments have a significant likelihood of failures. It has been shown in previous work that a common type of failure such as that of a joint "...
Manish Goel, Anthony A. Maciejewski, Venkataramana...
SIGMETRICS
2008
ACM
13 years 7 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 8 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet