Sciweavers

2106 search results - page 197 / 422
» Specifying C concepts
Sort
View
TPDS
2010
135views more  TPDS 2010»
15 years 2 months ago
Maximizing Service Reliability in Distributed Computing Systems with Random Node Failures: Theory and Implementation
—In distributed computing systems (DCSs) where server nodes can fail permanently with nonzero probability, the system performance can be assessed by means of the service reliabil...
Jorge E. Pezoa, Sagar Dhakal, Majeed M. Hayat
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
15 years 2 months ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
GLOBECOM
2010
IEEE
15 years 2 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
IFIPTCS
2010
15 years 2 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
SCN
2010
Springer
163views Communications» more  SCN 2010»
15 years 2 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia