Sciweavers

2162 search results - page 231 / 433
» Automated Reasoning on Feature Models
Sort
View
159
Voted
TPHOL
2003
IEEE
15 years 10 months ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
ICLP
2003
Springer
15 years 10 months ago
Loop Formulas for Disjunctive Logic Programs
Abstract. We extend Clark’s definition of a completed program and the definition of a loop formula due to Lin and Zhao to disjunctive logic programs. Our main result, generaliz...
Joohyung Lee, Vladimir Lifschitz
154
Voted
ECEH
2006
126views Healthcare» more  ECEH 2006»
15 years 6 months ago
Process-based E-Service-Logistics for Healthcare Networks
: Coordination in healthcare networks becomes increasingly important to enable integrated care scenarios, to enhance patient satisfaction and to reduce costs of the treatment proce...
Günter Schicker, Freimut Bodendorf
126
Voted
MVA
1994
104views Computer Vision» more  MVA 1994»
15 years 6 months ago
Represent and Acquire Knowledge for the Development of Autonomous Vision System
The visual perceptional ability of computer systems to understand the environment is desirable in engineering design and manufacturing where automation is anticipated. I n order t...
Xiaobu Yuan
CADE
2007
Springer
16 years 5 months ago
ALICE: An Advanced Logic for Interactive Component Engineering
This paper presents an overview of the verication framework ALICE in its current version 0.7. It is based on the generic theorem prover Isabelle [Pau03a]. Within ALICE a software o...
Borislav Gajanovic, Bernhard Rumpe