Sciweavers

1058 search results - page 37 / 212
» It's Doomed; We Can Prove It
Sort
View
ERCIMDL
2004
Springer
116views Education» more  ERCIMDL 2004»
14 years 3 months ago
Towards a Policy Language for Humans and Computers
Abstract. A policy is a statement that an action is permitted or forbidden if certain conditions hold. We introduce a language for reasoning about policies called Rosetta. What mak...
Vicky Weissman, Carl Lagoze
SRDS
2007
IEEE
14 years 4 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
ICNP
2009
IEEE
13 years 7 months ago
RASPberry: A Stable Reader Activation Scheduling Protocol in Multi-Reader RFID Systems
Abstract--Recent technological advances have motivated largescale deployment of RFID systems. RFID readers are often static and carefully deployed in a planned manner. However, the...
ShaoJie Tang, Jing Yuan, Xiang-Yang Li, Guihai Che...
CORR
2011
Springer
155views Education» more  CORR 2011»
13 years 1 months ago
The Theory of Intervention Games for Resource Sharing in Wireless Communications
This paper develops a game-theoretic framework for the design and analysis of a new class of incentive schemes called intervention schemes. We formulate intervention games, propos...
Jaeok Park, Mihaela van der Schaar
ACTA
2011
13 years 4 months ago
Nonatomic dual bakery algorithm with bounded tokens
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave...
Alex A. Aravind, Wim H. Hesselink