Sciweavers

3256 search results - page 497 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
170
Voted
EKAW
2006
Springer
15 years 9 months ago
Distributed Multi-contextual Ontology Evolution - A Step Towards Semantic Autonomy
In today's world there is a need for knowledge infrastructures that can support several autonomous knowledge bases all using different ontologies and constantly adapting thes...
Maciej Zurawski
CADE
2011
Springer
14 years 5 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
FMSB
2008
199views Formal Methods» more  FMSB 2008»
15 years 6 months ago
Bounded Asynchrony: Concurrency for Modeling Cell-Cell Interactions
We introduce bounded asynchrony, a notion of concurrency tailored to the modeling of biological cell-cell interactions. Bounded asynchrony is the result of a scheduler that bounds ...
Jasmin Fisher, Thomas A. Henzinger, Maria Mateescu...
JIDM
2010
160views more  JIDM 2010»
15 years 3 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
JNW
2008
118views more  JNW 2008»
15 years 3 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo