Sciweavers

5255 search results - page 155 / 1051
» Formal Methods for Privacy
Sort
View
IJIT
2004
15 years 5 months ago
Formal Verification of a Multicast Protocol In Mobile Networks
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
Mohammad Reza Matash Borujerdi, S. M. Mirzababaei
111
Voted
CONCUR
1999
Springer
15 years 7 months ago
Testing Concurrent Systems: A Formal Approach
This paper discusses the use of formal methods in testing of concurrent systems. It is argued that formal methods and testing can be mutually profitable and useful. A framework fo...
Jan Tretmans
EKAW
2006
Springer
15 years 7 months ago
From Natural Language to Formal Proof Goal
Guidelines (Extended abstract) Ruud Stegers1 , Annette ten Teije1 , and Frank van Harmelen1 Vrije Universiteit, Amsterdam The main problem encountered when starting verification of...
Ruud Stegers, Annette ten Teije, Frank van Harmele...
195
Voted
ISMIS
2005
Springer
15 years 9 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
113
Voted
WWW
2004
ACM
16 years 4 months ago
A method for modeling uncertainty in semantic web taxonomies
We present a method for representing and reasoning with uncertainty in RDF(S) and OWL ontologies based on Bayesian networks. Categories and Subject Descriptors: I.2.4 Artificial I...
Eero Hyvönen, Markus Holi