We demonstrate a prototype toolkit that uses constraints and constraint violation repair techniques to enable the automated detection and, where possible, the automated resolution...
Iain Sutherland, John S. Robinson, Sue M. Brandt, ...
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
In a distributed real-time database system (DRTDBS), a commit protocol is required to ensure transaction failure atomicity. If data conflicts occur between executing and committin...
Kam-yiu Lam, Chung-Leung Pang, Sang Hyuk Son, Jian...
Social influences play an important part in the actions that an individual agent may perform within a multi-agent society. However, the incomplete knowledge and the diverse and co...
Nishan C. Karunatillake, Nicholas R. Jennings, Iya...
Mobile computing characteristics demand data management systems to support independent operation. However, the execution of updates in a mobile client usually need to be considere...