Sciweavers

4075 search results - page 9 / 815
» Modeling Distributed Algorithm Using B
Sort
View
FC
2005
Springer
83views Cryptology» more  FC 2005»
14 years 2 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
CDC
2010
IEEE
133views Control Systems» more  CDC 2010»
13 years 4 months ago
Estimating state-space models in innovations form using the expectation maximisation algorithm
The expectation maximisation (EM) algorithm has proven to be effective for a range of identification problems. Unfortunately, the way in which the EM algorithm has previously been ...
Adrian Wills, Thomas B. Schön, Brett Ninness
ICDCS
2006
IEEE
14 years 3 months ago
Reputation-Based Scheduling on Unreliable Distributed Infrastructures
This paper presents a design and analysis of scheduling techniques to cope with the inherent unreliability and instability of worker nodes in large-scale donation-based distribute...
Jason D. Sonnek, Mukesh Nathan, Abhishek Chandra, ...
ENTCS
2007
121views more  ENTCS 2007»
13 years 9 months ago
Incremental Parametric Development of Greedy Algorithms
The event B method provides a general framework for modelling both data structures and algorithms. B models are validated by discharging proof obligations ensuring safety properti...
Dominique Cansell, Dominique Méry
EUROPAR
2005
Springer
14 years 2 months ago
Replication Predicates for Dependent-Failure Algorithms
Abstract. To establish lower bounds on the amount of replication, there is a common partition argument used to construct indistinguishable executions such that one violates some pr...
Flavio Paiva Junqueira, Keith Marzullo