Sciweavers

1833 search results - page 149 / 367
» Mechanized Verification with Sharing
Sort
View
ATAL
2001
Springer
15 years 9 months ago
Simple Negotiating Agents in Complex Games:
We present a simple model of distributed multi-agent multi-issued contract negotiation for open systems where interactions are competitive and information is private and not shared...
Peyman Faratin, Mark Klein, Hiroki Sayama, Yaneer ...
MSS
1999
IEEE
121views Hardware» more  MSS 1999»
15 years 9 months ago
Device Locks: Mutual Exclusion for Storage Area Networks
Device Locks are mechanisms used in distributed environments to facilitate mutual exclusion of shared resources. They can further be used to maintain coherence of data that is cac...
Kenneth W. Preslan, Steven R. Soltis, Christopher ...
ETRICS
2006
15 years 8 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
CONEXT
2008
ACM
15 years 6 months ago
Trellis: a platform for building flexible, fast virtual networks on commodity hardware
We describe Trellis, a platform for hosting virtual networks on shared commodity hardware. Trellis allows each virtual network to define its own topology, control protocols, and f...
Sapan Bhatia, Murtaza Motiwala, Wolfgang Mühl...
ICONIP
1998
15 years 6 months ago
A Comparison of Learning Transfer in Networks and Humans
Learning transfer is the improvement in performance on one task having learnt a related task. That the degree of transfer is signi cantly greater in humans than other primates and...
Steven Phillips