Sciweavers

282 search results - page 38 / 57
» The Design and Implementation of the Inversion File System
Sort
View
JCS
2008
119views more  JCS 2008»
13 years 7 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
ICCBR
2003
Springer
14 years 27 days ago
SOFT-CBR: A Self-Optimizing Fuzzy Tool for Case-Based Reasoning
A generic Case-Based Reasoning tool has been designed, implemented, and successfully used in two distinct applications. SOFT-CBR can be applied to a wide range of decision problems...
Kareem S. Aggour, Marc Pavese, Piero P. Bonissone,...
ISN
1995
Springer
13 years 11 months ago
Managing the TMN
Metamanagement provides a means to manage the management processes, systems and software comprising a TMN system. In this paper we present the basic requirements of metamanagement,...
Stelios Sartzetakis, Costas Stathopoulos, Vana Kal...
IPSN
2005
Springer
14 years 1 months ago
The particle computer system
Abstract—This paper presents a sensor-based, networked embedded system, referred to as the Particle computer system. It is comprised of tiny wireless sensor nodes, capable of com...
Christian Decker, Albert Krohn, Michael Beigl, Tob...
ATAL
2009
Springer
14 years 10 days ago
Adding incentives to file-sharing systems
Modern peer-to-peer file sharing systems rely heavily on the willingness of users to distribute files to others. A selfish user can choose to download a file and consume resou...
Aviv Zohar, Jeffrey S. Rosenschein