Sciweavers

350 search results - page 48 / 70
» What's in a Name
Sort
View
CCR
2010
130views more  CCR 2010»
13 years 10 months ago
Arguments for an information-centric internetworking architecture
The current Internet architecture focuses on communicating entities, largely leaving aside the information to be ex-changed among them. However, trends in communication scenarios ...
Dirk Trossen, Mikko Särelä, Karen R. Sol...
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 10 months ago
Graph-Constrained Group Testing
Non-adaptive group testing involves grouping arbitrary subsets of n items into different pools. Each pool is then tested and defective items are identified. A fundamental question...
Mahdi Cheraghchi, Amin Karbasi, Soheil Mohajer, Ve...
CORR
2010
Springer
68views Education» more  CORR 2010»
13 years 10 months ago
On the Rationality of Escalation
Escalation is a typical feature of infinite games. Therefore tools conceived for studying infinite mathematical structures, namely those deriving from coinduction are essential. H...
Pierre Lescanne, Perrinel Matthieu
ENTCS
2006
80views more  ENTCS 2006»
13 years 10 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 9 months ago
Model Checking Synchronized Products of Infinite Transition Systems
Formal verification using the model checking paradigm has to deal with two aspects: The system models are structured, often as products of components, and the specification logic...
Stefan Wöhrle, Wolfgang Thomas