Sciweavers

579 search results - page 111 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
ICPADS
2008
IEEE
14 years 2 months ago
Integrity-Preserving Replica Coordination for Byzantine Fault Tolerant Systems
The use of good random numbers is essential to the integrity of many mission-critical systems. However, when such systems are replicated for Byzantine fault tolerance, a serious i...
Wenbing Zhao
CONCUR
2007
Springer
14 years 1 months ago
Making Random Choices Invisible to the Scheduler
Abstract. When dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to res...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
OOPSLA
2007
Springer
14 years 1 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
HPCC
2005
Springer
14 years 1 months ago
A SMS Based Ubiquitous Home Care System
In this study, we defined requirements of ubiquitous environment, which users can monitor and control situations of home anytime, anywhere. In addition we developed and built a mod...
Tae-Seok Lee, Yuan Yang, Myong-Soon Park
CORR
2010
Springer
120views Education» more  CORR 2010»
13 years 7 months ago
How Much Multiuser Diversity is Required for Energy Limited Multiuser Systems?
Multiuser diversity (MUDiv) is one of the central concepts in multiuser (MU) systems. In particular, MUDiv allows for scheduling among users in order to eliminate the negative effe...
Youngwook Ko, Sergiy A. Vorobyov, Masoud Ardakani