Sciweavers

8 search results - page 2 / 2
» How Safe is Probabilistic Checkpointing
Sort
View
FOSSACS
2008
Springer
13 years 9 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
TSC
2008
144views more  TSC 2008»
13 years 7 months ago
Probabilistic QoS and Soft Contracts for Transaction-Based Web Services Orchestrations
Service level agreements (SLAs), or contracts, have an important role in web services. These contracts define the obligations and rights between the provider of a web service and i...
Sidney Rosario, Albert Benveniste, Stefan Haar, Cl...
MDM
2010
Springer
152views Communications» more  MDM 2010»
14 years 15 days ago
Finding One-Of Probably Nearest Neighbors with Minimum Location Updates
—Location information is necessarily uncertain when objects are constantly moving. The cost can be high to maintain precise locations at the application server for all the object...
Mitzi McCarthy, Xiaoyang Sean Wang, Zhen He