Sciweavers

1716 search results - page 71 / 344
» Proving Conditional Termination
Sort
View
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
14 years 2 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
FUIN
2008
89views more  FUIN 2008»
13 years 8 months ago
Is Timed Branching Bisimilarity a Congruence Indeed?
We show that timed branching bisimilarity as defined by Van der Zwaag [16] and Baeten and Middelburg [2] is not an equivalence relation, in case of a dense time domain. We propose ...
Wan Fokkink, Jun Pang, Anton Wijs
INFOCOM
2008
IEEE
14 years 3 months ago
On Survivable Access Network Design: Complexity and Algorithms
Abstract— We consider the computational complexity and algorithm challenges in designing survivable access networks. With limited routing capability, the structure of an access n...
Dahai Xu, Elliot Anshelevich, Mung Chiang
BIRTHDAY
2007
Springer
14 years 2 months ago
The Hydra Battle Revisited
Showing termination of the Battle of Hercules and Hydra is a challenge. We present the battle both as a rewrite system and as an arithmetic while program, provide proofs of their t...
Nachum Dershowitz, Georg Moser
AICT
2006
IEEE
111views Communications» more  AICT 2006»
14 years 2 months ago
Mobile Web Service Provisioning
This paper, discusses the feasibility of mobile Web Service provisioning from Smart Phones, confluencing two major recent trends in distributed information systems engineering: th...
Satish Narayana Srirama, Matthias Jarke, Wolfgang ...