Sciweavers

1490 search results - page 134 / 298
» The Logic of Authentication Protocols
Sort
View
113
Voted
CCGRID
2004
IEEE
15 years 7 months ago
Multi-dimensional quorum sets for read-few write-many replica control protocols
Abstract-- We describe
Bujor D. Silaghi, Peter J. Keleher, Bobby Bhattach...
SEMWEB
2004
Springer
15 years 9 months ago
A Semantic Web Resource Protocol: XPointer and HTTP
Semantic Web resources — that is, knowledge representation formalisms existing in a distributed hypermedia system — require different addressing and processing models and capac...
Kendall Clark, Bijan Parsia, Bryan B. Thompson, Br...
STTT
2010
113views more  STTT 2010»
14 years 10 months ago
Proved development of the real-time properties of the IEEE 1394 Root Contention Protocol with the event-B method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm
VLDB
1990
ACM
166views Database» more  VLDB 1990»
15 years 8 months ago
The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data
In this paper, we present an efficient algorithm for managing replicated data. We impose a logical tree structure on the set of copies of an object. In a failurefree environment t...
Divyakant Agrawal, Amr El Abbadi
AMAI
2004
Springer
15 years 3 months ago
Rapid Prototyping of Large Multi-Agent Systems Through Logic Programming
Prototyping is a valuable technique to help software engineers explore the design space while gaining insight on the dynamics of the system. In this paper, we describe a method for...
Wamberto Weber Vasconcelos, David Stuart Robertson...