Sciweavers

709 search results - page 45 / 142
» An Equational Theory for Transactions
Sort
View
CSREASAM
2006
15 years 2 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
LICS
2002
IEEE
15 years 6 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
ISCAS
2007
IEEE
75views Hardware» more  ISCAS 2007»
15 years 7 months ago
State-Space Analysis of Power Complementary Analog Filters
Abstract— This paper presents a new analysis of power complementary analog filters using the state-space representation. Our analysis is based on the bounded-real Riccati equati...
Shunsuke Koshita, Masahide Abe, Masayuki Kawamata
HYBRID
2005
Springer
15 years 6 months ago
A Toolbox of Hamilton-Jacobi Solvers for Analysis of Nondeterministic Continuous and Hybrid Systems
Abstract. Hamilton-Jacobi partial differential equations have many applications in the analysis of nondeterministic continuous and hybrid systems. Unfortunately, analytic solution...
Ian M. Mitchell, Jeremy A. Templeton
CADE
2006
Springer
15 years 5 months ago
A Sufficient Completeness Checker for Linear Order-Sorted Specifications Modulo Axioms
We present a tool for checking the sufficient completeness of linear, order-sorted equational specifications modulo associativity, commutativity, and identity. Our tool treats this...
Joe Hendrix, José Meseguer, Hitoshi Ohsaki