Sciweavers

1894 search results - page 196 / 379
» A TLA Proof System
Sort
View
138
Voted
LATA
2009
Springer
15 years 11 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig
SECURWARE
2008
IEEE
15 years 10 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
IFM
2005
Springer
100views Formal Methods» more  IFM 2005»
15 years 10 months ago
Embedding the Stable Failures Model of CSP in PVS
We present an embedding of the stable failures model of CSP in the PVS theorem prover. Our work, extending a previous embedding of the traces model of CSP in [6], provides a platfo...
Kun Wei, James Heather
ITRUST
2005
Springer
15 years 10 months ago
IWTrust: Improving User Trust in Answers from the Web
Abstract. Question answering systems users may find answers without any supporting information insufficient for determining trust levels. Once those question answering systems beg...
Ilya Zaihrayeu, Paulo Pinheiro da Silva, Deborah L...
CAV
2003
Springer
140views Hardware» more  CAV 2003»
15 years 9 months ago
Certifying Optimality of State Estimation Programs
Abstract. The theme of this paper is certifying software for state estimation of dynamic systems, which is an important problem found in spacecraft, aircraft, geophysical, and in m...
Grigore Rosu, Ram Prasad Venkatesan, Jon Whittle, ...