Sciweavers

835 search results - page 26 / 167
» Characterizing rosy theories
Sort
View
LPAR
2007
Springer
15 years 5 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
IWPC
2005
IEEE
15 years 5 months ago
Theories, Methods and Tools in Program Comprehension: Past, Present and Future
Program comprehension research can be characterized by both the theories that provide rich explanations about how programmers comprehend software, as well as the tools that are us...
Margaret-Anne D. Storey
IJCAI
1993
15 years 1 months ago
Generalization of the Dempster-Shafer Theory
The Dempster-Shafer theory gives a solid basis for reasoning applications characterized by uncertainty. A key feature of the theory is that propositions are represented as subsets...
J. W. Guan, David A. Bell
ESORICS
2010
Springer
15 years 26 days ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
ICLP
2009
Springer
16 years 12 days ago
Reducts of Propositional Theories, Satisfiability Relations, and Generalizations of Semantics of Logic Programs
Over the years, the stable-model semantics has gained a position of the correct (two-valued) interpretation of default negation in programs. However, for programs with aggregates (...
Miroslaw Truszczynski