Sciweavers

3909 search results - page 334 / 782
» Extreme Model Checking
Sort
View
LPNMR
2009
Springer
15 years 10 months ago
Complexity of the Stable Model Semantics for Queries on Incomplete Databases
Abstract. We study the complexity of consistency checking and query answering on incomplete databases for languages ranging from non-recursive Datalog to disjunctive Datalog with n...
Jos de Bruijn, Stijn Heymans
SSS
2007
Springer
117views Control Systems» more  SSS 2007»
15 years 10 months ago
Distributed Synthesis of Fault-Tolerant Programs in the High Atomicity Model
In this paper, we concentrate on distributed algorithms for automated synthesis of fault-tolerant programs in the high atomicity model, where all processes can read and write all p...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Fuad Abu...
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 9 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
FORMATS
2005
Springer
15 years 9 months ago
Implementation of Timed Automata: An Issue of Semantics or Modeling?
Abstract. We examine to what extent implementation of timed automata can be achieved using the standard semantics and appropriate modeling, instead of introducing new semantics. We...
Karine Altisen, Stavros Tripakis
135
Voted
ESORICS
2003
Springer
15 years 9 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...