Sciweavers

709 search results - page 45 / 142
» An Equational Theory for Transactions
Sort
View
CSREASAM
2006
15 years 22 days ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
LICS
2002
IEEE
15 years 4 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
ISCAS
2007
IEEE
75views Hardware» more  ISCAS 2007»
15 years 5 months ago
State-Space Analysis of Power Complementary Analog Filters
Abstract— This paper presents a new analysis of power complementary analog filters using the state-space representation. Our analysis is based on the bounded-real Riccati equati...
Shunsuke Koshita, Masahide Abe, Masayuki Kawamata
HYBRID
2005
Springer
15 years 4 months ago
A Toolbox of Hamilton-Jacobi Solvers for Analysis of Nondeterministic Continuous and Hybrid Systems
Abstract. Hamilton-Jacobi partial differential equations have many applications in the analysis of nondeterministic continuous and hybrid systems. Unfortunately, analytic solution...
Ian M. Mitchell, Jeremy A. Templeton
CADE
2006
Springer
15 years 3 months ago
A Sufficient Completeness Checker for Linear Order-Sorted Specifications Modulo Axioms
We present a tool for checking the sufficient completeness of linear, order-sorted equational specifications modulo associativity, commutativity, and identity. Our tool treats this...
Joe Hendrix, José Meseguer, Hitoshi Ohsaki