Sciweavers

4340 search results - page 779 / 868
» Formal Methods and Cryptography
Sort
View
JAPLL
2008
121views more  JAPLL 2008»
15 years 4 months ago
Reasoning with prioritized information by iterative aggregation of distance functions
We introduce a general framework for reasoning with prioritized propositional data by aggregation of distance functions. Our formalism is based on a possible world semantics, wher...
Ofer Arieli
IJON
2006
131views more  IJON 2006»
15 years 4 months ago
Optimizing blind source separation with guided genetic algorithms
This paper proposes a novel method for blindly separating unobservable independent component (IC) signals based on the use of a genetic algorithm. It is intended for its applicati...
J. M. Górriz, Carlos García Puntonet...
JCIT
2008
129views more  JCIT 2008»
15 years 4 months ago
A New Rule Scheduling Approach based on Estimation of Rule Execution Probability in Active Database
Active database systems (ADBS) can, automatically, react to the occurrence of predefined events by definition a collection of active rules. One of the most important modules of AD...
Abbas Rasoolzadegan, Rohollah Alesheykh, Ahmad Abd...
146
Voted
INFFUS
2006
101views more  INFFUS 2006»
15 years 4 months ago
Fusion rules for merging uncertain information
In previous papers, we have presented a logic-based framework based on fusion rules for merging structured news reports [Hun00, Hun02b, Hun02a, HS03, HS04]. Structured news report...
Anthony Hunter, Weiru Liu
JALC
2006
87views more  JALC 2006»
15 years 4 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...