Sciweavers

1923 search results - page 38 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
SPAA
2003
ACM
14 years 3 months ago
The complexity of verifying memory coherence
The general problem of verifying coherence for shared-memory multiprocessor executions is NP-Complete. Verifying memory consistency models is therefore NP-Hard, because memory con...
Jason F. Cantin, Mikko H. Lipasti, James E. Smith
ICNP
2005
IEEE
14 years 3 months ago
A Family of Collusion Resistant Protocols for Instantiating Security
In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and t...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
WSC
2004
13 years 11 months ago
Simulating Growth Dynamics in Complex Adaptive Supply Networks
This paper discusses an extended adaptive supply network simulation model that explicitly captures growth (in terms of change in size over time, and birth and death) based on Utte...
Surya Dev Pathak, David M. Dilts, Gautam Biswas
EDBT
2006
ACM
150views Database» more  EDBT 2006»
14 years 1 months ago
A Framework for Distributed XML Data Management
As data management applications grow more complex, they may need efficient distributed query processing, but also subscription management, data archival etc. To enact such applicat...
Serge Abiteboul, Ioana Manolescu, Emanuel Taropa