Sciweavers

4573 search results - page 854 / 915
» Automated Reasoning
Sort
View
CCS
2007
ACM
15 years 6 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
ISVC
2007
Springer
15 years 6 months ago
Motion Projection for Floating Object Detection
Abstract. Floating mines are a significant threat to the safety of ships in theatres of military or terrorist conflict. Automating mine detection is difficult, due to the unpredict...
Zhaoyi Wei, Dah-Jye Lee, David Jilk, Robert B. Sch...
OTM
2007
Springer
15 years 6 months ago
An Outlook on Semantic Business Process Mining and Monitoring
Semantic Business Process Management (SBPM) has been proposed as an extension of BPM with Semantic Web and Semantic Web Services (SWS) technologies in order to increase and enhance...
Ana Karla Alves de Medeiros, Carlos Pedrinaci, Wil...
SEMWEB
2007
Springer
15 years 6 months ago
Formulation of Hierarchical Task Network Service (De)composition
The Hierarchical Task Network (HTN) planning method is conceived of as a useful method for Web service composition as well as classical task planning. However, there are no complet...
Seiji Koide, Hideaki Takeda
DATE
2006
IEEE
133views Hardware» more  DATE 2006»
15 years 6 months ago
Automatic generation of operation tables for fast exploration of bypasses in embedded processors
Customizing the bypasses in an embedded processor uncovers valuable trade-offs between the power, performance and the cost of the processor. Meaningful exploration of bypasses re...
Sanghyun Park, Eugene Earlie, Aviral Shrivastava, ...