Sciweavers

33 search results - page 3 / 7
» Conflict Detection in Call Control Using First-Order Logic M...
Sort
View
FMSD
2006
140views more  FMSD 2006»
13 years 5 months ago
Dealing with practical limitations of distributed timed model checking for timed automata
Two base algorithms are known for reachability verification over timed automata. They are called forward and backwards, and traverse the automata edges using either successors or p...
Víctor A. Braberman, Alfredo Olivero, Ferna...
HYBRID
2007
Springer
13 years 11 months ago
Model Checking Genetic Regulatory Networks with Parameter Uncertainty
The lack of precise numerical information for the values of biological parameters severely limits the development and analysis of models of genetic regulatory networks. To deal wit...
Grégory Batt, Calin Belta, Ron Weiss
DEON
2008
Springer
13 years 7 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
ML
2006
ACM
143views Machine Learning» more  ML 2006»
13 years 5 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
CAV
2008
Springer
113views Hardware» more  CAV 2008»
13 years 7 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg