Sciweavers

5255 search results - page 308 / 1051
» Formal Methods for Privacy
Sort
View
ATAL
2007
Springer
15 years 8 months ago
Planning and defeasible reasoning
We present an argumentation-based formalism that an agent could use for constructing plans. We will analyze the interaction of arguments and actions when they are combined to cons...
Diego R. García, Alejandro Javier Garc&iacu...
FMCO
2007
Springer
124views Formal Methods» more  FMCO 2007»
15 years 8 months ago
Certification Using the Mobius Base Logic
This paper describes a core component of Mobius' Trusted Code Base, the Mobius base logic. This program logic facilitates the transmission of certificates that are generated u...
Lennart Beringer, Martin Hofmann, Mariela Pavlova
ICFCA
2007
Springer
15 years 8 months ago
On Multi-adjoint Concept Lattices: Definition and Representation Theorem
Several fuzzifications of formal concept analysis have been proposed to deal with uncertainty or incomplete information. In this paper, we focus on the new paradigm of multi-adjoin...
Jesús Medina, Manuel Ojeda-Aciego, Jorge Ru...
FM
2006
Springer
124views Formal Methods» more  FM 2006»
15 years 8 months ago
Compositional Binding in Network Domains
This paper considers network services that bind identifiers in the course of delivering messages, and also persistent, point-to-point connections made in the context of such bindin...
Pamela Zave
FMICS
2006
Springer
15 years 8 months ago
jmle: A Tool for Executing JML Specifications Via Constraint Programming
Formal specifications are more useful and easier to develop if they are executable. In this work, we describe a system for executing specifications written in the Java Modeling Lan...
Ben Krause, Tim Wahls