Sciweavers

5255 search results - page 267 / 1051
» Formal Methods for Privacy
Sort
View
FMCAD
2008
Springer
15 years 6 months ago
A Theory of Mutations with Applications to Vacuity, Coverage, and Fault Tolerance
The quality of formal specifications and the circuits they are written for can be evaluated through checks such as vacuity and coverage. Both checks involve mutations to the specif...
Orna Kupferman, Wenchao Li, Sanjit A. Seshia
FMSB
2008
138views Formal Methods» more  FMSB 2008»
15 years 6 months ago
Combining Intra- and Inter-cellular Dynamics to Investigate Intestinal Homeostasis
Abstract. This paper reports on the multi-scale modelling of an intestinal crypt cellular structure coupled with Wnt signalling. Using formal modelling techniques based on the stoc...
Oksana Tymchyshyn, Marta Z. Kwiatkowska
FMCAD
2004
Springer
15 years 8 months ago
A Simple Method for Parameterized Verification of Cache Coherence Protocols
Abstract. We present a simple method for verifying the safety properties of cache coherence protocols with arbitrarily many nodes. Our presentation begins with two examples. The fi...
Ching-Tsun Chou, Phanindra K. Mannava, Seungjoon P...
ISOLA
2010
Springer
15 years 2 months ago
LivingKnowledge: Kernel Methods for Relational Learning and Semantic Modeling
Latest results of statistical learning theory have provided techniques such us pattern analysis and relational learning, which help in modeling system behavior, e.g. the semantics ...
Alessandro Moschitti
ICCS
2009
Springer
15 years 11 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel