Sciweavers

769 search results - page 105 / 154
» Where Is the Proof
Sort
View
EUROSYS
2010
ACM
14 years 3 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
COOPIS
2002
IEEE
14 years 2 months ago
Extending Datatype Support in Web Ontology Reasoning
The Semantic Web is a vision of the next generation Web, in which semantic markup will make Web resources more accessible to automatic processes. Description Logics (DLs) are of cr...
Jeff Z. Pan, Ian Horrocks
NDSS
2002
IEEE
14 years 2 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...
FM
2009
Springer
163views Formal Methods» more  FM 2009»
14 years 2 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
PKDD
2009
Springer
184views Data Mining» more  PKDD 2009»
14 years 2 months ago
Boosting Active Learning to Optimality: A Tractable Monte-Carlo, Billiard-Based Algorithm
Abstract. This paper focuses on Active Learning with a limited number of queries; in application domains such as Numerical Engineering, the size of the training set might be limite...
Philippe Rolet, Michèle Sebag, Olivier Teyt...