Sciweavers

733 search results - page 78 / 147
» Private inference control
Sort
View
CSL
2006
Springer
14 years 1 months ago
Algorithms for Omega-Regular Games with Imperfect Information,
We study observation-based strategies for two-player turn-based games on graphs with omega-regular objectives. An observation-based strategy relies on imperfect information about t...
Krishnendu Chatterjee, Laurent Doyen, Thomas A. He...
DIAGRAMS
2006
Springer
14 years 1 months ago
Flow Diagrams: Rise and Fall of the First Software Engineering Notation
Drawings of water are the earliest, least abstract forms of flow diagram. Representations of ideal or generalised sequences for manufacturing or actual paths for materials between ...
Stephen J. Morris, O. C. Z. Gotel
VLDB
1995
ACM
59views Database» more  VLDB 1995»
14 years 1 months ago
Towards a Cooperative Transaction Model - The Cooperative Activity Model
With the emergence of cooperative applications it turned out that traditional transaction concepts are not suitable for these scenarios. Isolation of transactions, as guaranteed b...
Marek Rusinkiewicz, Wolfgang Klas, Thomas Tesch, J...
MOBISYS
2008
ACM
14 years 13 days ago
Transient customization of mobile computing infrastructure
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...
CCS
2008
ACM
14 years 3 days ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage