Sciweavers

534 search results - page 91 / 107
» Proving Termination of Rewrite Systems Using Bounds
Sort
View
CC
2007
Springer
123views System Software» more  CC 2007»
13 years 8 months ago
An Improved Analysis of Linear Mergers
Mergers are procedures that, with the aid of a short random string, transform k (possibly dependent) random sources into a single random source, in a way that ensures that if one ...
Zeev Dvir, Amir Shpilka
SOSP
2001
ACM
14 years 5 months ago
The Costs and Limits of Availability for Replicated Services
As raw system and network performance continues to improve at exponential rates, the utility of many services is increasingly limited by availability rather than performance. A ke...
Haifeng Yu, Amin Vahdat
FIW
2003
115views Communications» more  FIW 2003»
13 years 10 months ago
Generalising Feature Interactions in Email
We report on a property-based approach to feature interaction analysis for a client-server email system. The model is based upon Hall’s email model [12] presented at FIW’00 [3]...
Muffy Calder, Alice Miller
ESOP
2009
Springer
14 years 3 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
13 years 6 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport