Sciweavers

5255 search results - page 226 / 1051
» Formal Methods for Privacy
Sort
View
MKM
2007
Springer
15 years 10 months ago
Using Formal Concept Analysis in Mathematical Discovery
Formal concept analysis (FCA) comprises a set of powerful algorithms which can be used for data analysis and manipulation, and a set of visualisation tools which enable the discove...
Simon Colton, Daniel Wagner
LPNMR
2005
Springer
15 years 9 months ago
An ID-Logic Formalization of the Composition of Autonomous Databases
We introduce a declarative approach for a coherent composition of autonomous databases. For this we use ID-logic, a formalism that extends classical logic with inductive definitio...
Bert Van Nuffelen, Ofer Arieli, Alvaro Corté...
DSD
2002
IEEE
102views Hardware» more  DSD 2002»
15 years 9 months ago
Formal Verification of a DSP Chip Using an Iterative Approach
In this paper we describe a methodology for the formal verification of a DSP chip using the HOL theorem prover. We used an iterative method to specify both the behavioral and stru...
Ali Habibi, Sofiène Tahar, Adel Ghazel
WCRE
1999
IEEE
15 years 8 months ago
A Formal Approach for Reverse Engineering: A Case Study
As a program evolves, it becomes increasingly difficult to understand and reason about changes in the source code. Eventually, if enough changes are made, reverse engineering and ...
Gerald C. Gannod, Betty H. C. Cheng
122
Voted
ICSE
1993
IEEE-ACM
15 years 8 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan