Sciweavers

5255 search results - page 367 / 1051
» Formal Methods for Privacy
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
WWW
2003
ACM
16 years 5 months ago
Three theses of representation in the semantic web
The Sematic Web is vitally dependant on a formal meaning for the constructs of its languages. For Semantic Web languages to work well together their formal meanings must employ a ...
Ian Horrocks, Peter F. Patel-Schneider
POPL
2003
ACM
16 years 5 months ago
The essence of XML
The World-Wide Web Consortium (W3C) promotes XML and related standards, including XML Schema, XQuery, and XPath. This paper describes a formalization XML Schema. A formal semantic...
Jérôme Siméon, Philip Wadler
151
Voted
ICFCA
2010
Springer
15 years 11 months ago
Hardness of Enumerating Pseudo-intents in the Lectic Order
We investigate the complexity of enumerating pseudo-intents in the lectic order. We look at the following decision problem: Given a formal context and a set of n pseudo-intents det...
Felix Distel
128
Voted
FM
2009
Springer
106views Formal Methods» more  FM 2009»
15 years 11 months ago
Translating Safe Petri Nets to Statecharts in a Structure-Preserving Way
Statecharts and Petri nets are two popular visual formalisms for modelling complex systems that exhibit concurrency. Both formalisms are supported by various design tools. To enabl...
Rik Eshuis