Sciweavers

671 search results - page 112 / 135
» Semantics Preserving Model Composition
Sort
View
ICSOC
2010
Springer
13 years 8 months ago
Service Discovery Using Communication Fingerprints
A request to a service registry must be answered with a service that fits in several regards, including semantic compatibility, non-functional compatibility, and interface compati...
Olivia Oanea, Jan Sürmeli, Karsten Wolf
WWW
2005
ACM
14 years 10 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
14 years 9 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
BERTINORO
2005
Springer
14 years 3 months ago
Multifaceted Simultaneous Load Balancing in DHT-Based P2P Systems: A New Game with Old Balls and Bins
In this paper we present and evaluate uncoordinated on-line algorithms for simultaneous storage and replication load-balancing in DHT-based peer-to-peer systems. We compare our ap...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth
CAV
2005
Springer
144views Hardware» more  CAV 2005»
14 years 3 months ago
Romeo: A Tool for Analyzing Time Petri Nets
In this paper, we present the features of Romeo, a Time Petri Net (TPN) analyzer. The tool Romeo allows state space computation of TPN and on-the-fly model-checking of reachabilit...
Guillaume Gardey, Didier Lime, Morgan Magnin, Oliv...