Sciweavers

IFIPTCS
2010
13 years 10 months ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...
SAGT
2010
Springer
191views Game Theory» more  SAGT 2010»
13 years 10 months ago
Complexity of Safe Strategic Voting
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a pot...
Noam Hazon, Edith Elkind
JFP
2010
107views more  JFP 2010»
13 years 11 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan