Sciweavers

1151 search results - page 128 / 231
» Collaborative Programming: Applications of Logic and Automat...
Sort
View
114
Voted
CADE
2008
Springer
16 years 4 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
228
Voted
CONCUR
2011
Springer
14 years 3 months ago
Reasoning about Threads with Bounded Lock Chains
The problem of model checking threads interacting purely via the standard synchronization primitives is key for many concurrent program analyses, particularly dataflow analysis. U...
Vineet Kahlon
123
Voted
LPNMR
2005
Springer
15 years 9 months ago
KMonitor - A Tool for Monitoring Plan Execution in Action Theories
We present a monitoring tool for plan execution in non-deterministic environments, which are described in an action language, based on non-monotonic logic programming. Thanks to it...
Thomas Eiter, Michael Fink, Ján Senko
120
Voted
LICS
2007
IEEE
15 years 10 months ago
Local Action and Abstract Separation Logic
tion and Abstract Separation Logic Cristiano Calcagno Imperial College, London Peter W. O’Hearn Queen Mary, University of London Hongseok Yang Queen Mary, University of London S...
Cristiano Calcagno, Peter W. O'Hearn, Hongseok Yan...
187
Voted
COLT
1994
Springer
15 years 7 months ago
Bayesian Inductive Logic Programming
Inductive Logic Programming (ILP) involves the construction of first-order definite clause theories from examples and background knowledge. Unlike both traditional Machine Learnin...
Stephen Muggleton