Sciweavers

222 search results - page 34 / 45
» A Formal Verification Methodology for Checking Data Integrit...
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 6 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
TCBB
2008
137views more  TCBB 2008»
14 years 11 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
BMCBI
2007
93views more  BMCBI 2007»
14 years 11 months ago
Representing default knowledge in biomedical ontologies: application to the integration of anatomy and phenotype ontologies
Background: Current efforts within the biomedical ontology community focus on achieving interoperability between various biomedical ontologies that cover a range of diverse domain...
Robert Hoehndorf, Frank Loebe, Janet Kelso, Heinri...
POPL
2010
ACM
15 years 2 months ago
Programming with angelic nondeterminism
Angelic nondeterminism can play an important role in program development. It simplifies specifications, for example in deriving programs with a refinement calculus; it is the form...
Rastislav Bodík, Satish Chandra, Joel Galen...
ATAL
2008
Springer
15 years 1 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...