Sciweavers

1167 search results - page 203 / 234
» policy 2007
Sort
View
TARK
2007
Springer
14 years 4 months ago
From conditional probability to the logic of doxastic actions
We investigate the discrete (finite) case of the Popper-Renyi theory of conditional probability, introducing discrete conditional probabilistic models for (multi-agent) knowledge...
Alexandru Baltag, Sonja Smets
VLDB
2007
ACM
150views Database» more  VLDB 2007»
14 years 4 months ago
Monitoring Business Processes with Queries
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. These are complex, often distributed, processes. Monitoring the execution of ...
Catriel Beeri, Anat Eyal, Tova Milo, Alon Pilberg
WDAG
2007
Springer
162views Algorithms» more  WDAG 2007»
14 years 4 months ago
A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
Communication in networks suffers if a link fails. When the links are edges of a tree that has been chosen from an underlying graph of all possible links, a broken link even disco...
Beat Gfeller, Nicola Santoro, Peter Widmayer
WINE
2007
Springer
191views Economy» more  WINE 2007»
14 years 4 months ago
The Importance of Network Topology in Local Contribution Games
We consider a model of content contribution in peer-to-peer networks with linear quadratic payoffs and very general interaction patterns. We find that Nash equilibria of this gam...
Jacomo Corbo, Antoni Calvó-Armengol, David ...
EUROCRYPT
2005
Springer
14 years 4 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller