Sciweavers

5255 search results - page 345 / 1051
» Formal Methods for Privacy
Sort
View
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
15 years 11 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...
IFM
1999
Springer
15 years 9 months ago
Integration Problems in Telephone Feature Requirements
The feature interaction problem is prominent in telephone service development. Through a number of case studies, we have discovered that no single semantic framework is suitable f...
J. Paul Gibson, Geoff Hamilton, Dominique Mé...
CAEPIA
2003
Springer
15 years 8 months ago
Embracing Causality in Inducing the Effects of Actions
Abstract. The following problem will be considered: from scattered examples on the behavior of a dynamic system induce a description of the system. For the induced description to b...
Ramón P. Otero
DGO
2003
121views Education» more  DGO 2003»
15 years 6 months ago
Extending Metadata Definitions by Automatically Extracting and Organizing Glossary Definitions
Metadata descriptions of database contents are required to build and use systems that access and deliver data in response to user requests. When numerous heterogeneous databases a...
Eduard H. Hovy, Andrew Philpot, Judith Klavans, Ul...
CCS
2008
ACM
15 years 6 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...