Sciweavers

6608 search results - page 1243 / 1322
» On the Completeness of Model Checking
Sort
View
119
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
174
Voted
WORDS
2005
IEEE
15 years 9 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
149
Voted
SIGECOM
2005
ACM
134views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
Congestion games with failures
We introduce a new class of games, congestion games with failures (CGFs), which extends the class of congestion games to allow for facility failures. In a basic CGF (BCGF) agents ...
Michal Penn, Maria Polukarov, Moshe Tennenholtz
126
Voted
APN
2005
Springer
15 years 9 months ago
Genetic Process Mining
The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discov...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
130
Voted
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
« Prev « First page 1243 / 1322 Last » Next »