Sciweavers

5255 search results - page 948 / 1051
» Formal Methods for Privacy
Sort
View
CONEXT
2008
ACM
15 years 4 months ago
Maintaining replicas in unstructured P2P systems
Replication is widely used in unstructured peer-to-peer systems to improve search or achieve availability. We identify and solve a subclass of replication problems where each obje...
Christof Leng, Wesley W. Terpstra, Bettina Kemme, ...
DCOSS
2008
Springer
15 years 4 months ago
Improving the Data Delivery Latency in Sensor Networks with Controlled Mobility
Unlike traditional multihop forwarding among homogeneous static sensor nodes, use of mobile devices for data collection in wireless sensor networks has recently been gathering more...
Ryo Sugihara, Rajesh K. Gupta
DSVIS
2008
Springer
15 years 4 months ago
Cascading Dialog Modeling with UsiXML
In the last years User Interface Description Languages (UIDL) appeared as a suitable solution for developing multi-target user interfaces. By applying appropriate model transformat...
Marco Winckler, Jean Vanderdonckt, Adrian Stanciul...
ECAI
2008
Springer
15 years 4 months ago
Optimizing Causal Link Based Web Service Composition
Automation of Web service composition is one of the most interesting challenges facing the Semantic Web today. Since Web services have been enhanced with formal semantic descriptio...
Freddy Lécué, Alexandre Delteil, Ala...
ECSA
2008
Springer
15 years 4 months ago
Non-synchronous Communications in Process Algebraic Architectural Description Languages
Abstract. Architectural description languages are a useful tool for modmplex software systems at a high level of abstraction and, if based on formal methods, for enabling the early...
Marco Bernardo, Edoardo Bontà