Sciweavers

5255 search results - page 210 / 1051
» Formal Methods for Privacy
Sort
View
IEEECIT
2010
IEEE
15 years 2 months ago
Interpretation of AADL Behavior Annex into Synchronous Formalism Using SSA
This article focuses on the essence and distinctive features of the AADL behavioral aspects, for which we use the code generation infrastructure of the synchronous modeling enviro...
Yue Ma, Jean-Pierre Talpin, Thierry Gautier
IJSSE
2011
127views more  IJSSE 2011»
14 years 10 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang
SAC
2010
ACM
15 years 10 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
132
Voted
ECBS
2006
IEEE
158views Hardware» more  ECBS 2006»
15 years 10 months ago
Automated Translation of C/C++ Models into a Synchronous Formalism
For complex systems that are reusing intellectual property components, functional and compositional design correctness are an important part of the design process. Common system l...
Hamoudi Kalla, Jean-Pierre Talpin, David Berner, L...
FM
2006
Springer
146views Formal Methods» more  FM 2006»
15 years 7 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler