Sciweavers

5255 search results - page 175 / 1051
» Formal Methods for Privacy
Sort
View
122
Voted
ENTCS
2007
143views more  ENTCS 2007»
15 years 3 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 5 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
122
Voted
SAC
2006
ACM
15 years 9 months ago
A UML 2-compatible language and tool for formal modeling real-time system architectures
ArchiTRIO is a formal language, which complements UML 2.0 concepts with a formal, logic-based notation that allows users to state system-wide properties, both static and dynamic, ...
Pietro Colombo, Matteo Pradella, Matteo Rossi
124
Voted
WICSA
2008
15 years 5 months ago
Towards a Formal Model for Reconfigurable Software Architectures by Bigraphs
With the spread of the Internet and software evolution in complex intensive systems, software architecture often need be reconfigured during runtime to adapt variable environments...
Zhiming Chang, XinJun Mao, Zhichang Qi
150
Voted
KBSE
2005
IEEE
15 years 9 months ago
Identifying traits with formal concept analysis
Traits are basically mixins or interfaces but with method bodies. In languages that support traits, classes are composed out of traits. There are two main advantages with traits. ...
Adrian Lienhard, Stéphane Ducasse, Gabriela...