Sciweavers

372 search results - page 63 / 75
» Model Checking Commitment Protocols
Sort
View
BDA
2003
15 years 3 months ago
Adaptable Mobile Transactions
Mobile environments are characterized by high variability (e.g. variable bandwidth, disconnections, different communication prices) as well as by limited mobile host resources. Suc...
Patricia Serrano-Alvarado, Claudia Roncancio, Mich...
120
Voted
MMSYS
2012
199views more  MMSYS 2012»
13 years 10 months ago
AngelCast: cloud-based peer-assisted live streaming using optimized multi-tree construction
Increasingly, commercial content providers (CPs) offer streaming and IPTV solutions that leverage an underlying peerto-peer (P2P) stream distribution architecture. The use of P2P...
Raymond Sweha, Vatche Ishakian, Azer Bestavros
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 2 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
119
Voted
QEST
2007
IEEE
15 years 8 months ago
GRIP: Generic Representatives in PRISM
We give an overview of GRIP, a symmetry reduction tool for the probabilistic model checker PRISM, together with experimental results for a selection of example specifications. 1 ...
Alastair F. Donaldson, Alice Miller, David Parker
ICTAC
2005
Springer
15 years 7 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel