Sciweavers

1307 search results - page 85 / 262
» Follow the intellectual property
Sort
View
VMCAI
2010
Springer
15 years 10 months ago
Considerate Reasoning and the Composite Design Pattern
We propose Considerate Reasoning, a novel specification and verification technique based on object invariants. This technique supports succinct specifications of implementations wh...
Alexander J. Summers, Sophia Drossopoulou
FORMATS
2009
Springer
15 years 8 months ago
Synthesis of Non-Interferent Timed Systems
In this paper, we focus on the synthesis of secure timed systems which are given by timed automata. The security property that the system must satisfy is a non-interference propert...
Gilles Benattar, Franck Cassez, Didier Lime, Olivi...
IDC
2009
Springer
15 years 8 months ago
A Case Study on Availability of Sensor Data in Agent Cooperation
Abstract Multi-agent cooperation can in several cases be used in order to mitigate problems relating to task sharing within physical processes. In this paper we apply agent based s...
Christian Johansson, Fredrik Wernstedt, Paul David...
LICS
2008
IEEE
15 years 8 months ago
Mechanizing the Metatheory of LF
LF is a dependent type theory in which many other formal systems can be conveniently embedded. However, correct use of LF relies on nontrivial metatheoretic developments such as p...
Christian Urban, James Cheney, Stefan Berghofer
ISCAS
2007
IEEE
97views Hardware» more  ISCAS 2007»
15 years 7 months ago
Modeling the Telephone Call Network
— It is natural to envisage that in a telephone network, some telephone numbers originate or receive more calls than others. Indeed, real-life data have verified the conjecture ...
Wai Man Tam, Francis C. M. Lau, C. K. Michael Tse