Sciweavers

1512 search results - page 240 / 303
» Description Logic Terminology
Sort
View
CORR
2006
Springer
105views Education» more  CORR 2006»
14 years 12 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
ENTCS
2006
110views more  ENTCS 2006»
14 years 12 months ago
Semantic Interoperability of Heterogeneous Semantic Resources
This paper presents a three-step approach for interoperabilising heterogeneous semantic resources. Firstly, we construct homogeneous representations of these resources in a pivot ...
Catarina Ferreira Da Silva, Lionel Médini, ...
IJISEC
2008
101views more  IJISEC 2008»
14 years 12 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna
KES
2008
Springer
14 years 11 months ago
Ontology-Based Design Pattern Recognition
This paper presents ontology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontolog...
Damir Kirasic, Danko Basch
ENTCS
2007
130views more  ENTCS 2007»
14 years 11 months ago
Specify, Compile, Run: Hardware from PSL
We propose to use a formal specification language as a high-level hardware description language. Formal languages allow for compact, unambiguous representations and yield designs...
Roderick Bloem, Stefan Galler, Barbara Jobstmann, ...