Sciweavers

5255 search results - page 204 / 1051
» Formal Methods for Privacy
Sort
View
129
Voted
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 10 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
KCAP
2009
ACM
15 years 10 months ago
Formally measuring agreement and disagreement in ontologies
Ontologies are conceptual models of particular domains, and domains can be modeled differently, representing different opinions, beliefs or perspectives. In other terms, ontolog...
Mathieu d'Aquin
COMPSAC
1997
IEEE
15 years 8 months ago
A formal approach to software components classification and retrieval
I n this paper, we propose an approach to reuse-based software development using formal method. I n our approach, each software component is annotated with a set of predicates to ...
Chao-Tsun Chang, William C. Chu, Chung-Shyan Liu, ...
ICFCA
2007
Springer
15 years 7 months ago
A Proposal for Combining Formal Concept Analysis and Description Logics for Mining Relational Data
Recent advances in data and knowledge engineering have emphasized the need for formal concept analysis (FCA) tools taking into account structured data. There are a few adaptations ...
Mohamed Rouane Hacene, Marianne Huchard, Amedeo Na...
FMCAD
2008
Springer
15 years 5 months ago
BackSpace: Formal Analysis for Post-Silicon Debug
Post-silicon debug is the problem of determining what's wrong when the fabricated chip of a new design behaves incorrectly. This problem now consumes over half of the overall ...
Flavio M. de Paula, Marcel Gort, Alan J. Hu, Steve...