Sciweavers

1894 search results - page 287 / 379
» A TLA Proof System
Sort
View
IJCAI
1989
15 years 5 months ago
A Theorem Prover for Prioritized Circumscription
In a recent paper, Ginsberg shows how a backward-chaining ATMS can be used to construct a theorem prover for circumscription. Here, this work is extended to handle prioritized cir...
Andrew B. Baker, Matthew L. Ginsberg
150
Voted
CCS
2008
ACM
15 years 6 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
CADE
2005
Springer
16 years 4 months ago
Temporal Logics over Transitive States
Abstract. We investigate the computational behaviour of `two-dimensional' propositional temporal logics over (N, <) (with and without the next-time operator ?) that are cap...
Boris Konev, Frank Wolter, Michael Zakharyaschev
161
Voted
STOC
2007
ACM
169views Algorithms» more  STOC 2007»
16 years 4 months ago
Proportional response dynamics leads to market equilibrium
One of the main reasons of the recent success of peer to peer (P2P) file sharing systems such as BitTorrent is its built-in tit-for-tat mechanism. In this paper, we model the band...
Fang Wu, Li Zhang
149
Voted
PERCOM
2006
ACM
16 years 3 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...