Sciweavers

5255 search results - page 911 / 1051
» Formal Methods for Privacy
Sort
View
AI
2007
Springer
15 years 10 months ago
Constructing a User Preference Ontology for Anti-spam Mail Systems
The judgment that whether an email is spam or non-spam may vary from person to person. Different individuals can have totally different responses to the same email based on their p...
Jongwan Kim, Dejing Dou, Haishan Liu, Donghwi Kwak
112
Voted
ATAL
2007
Springer
15 years 10 months ago
Diagnosis of plan step errors and plan structure violations
Failures in plan execution can be attributed to errors in the execution of plan steps or violations of the plan structure. The structure of a plan prescribes which actions have to...
Cees Witteveen, Nico Roos, Adriaan ter Mors, Xiaoy...
ATAL
2007
Springer
15 years 10 months ago
Preservation of obligations in a temporal and deontic framework
We study logical properties that concern the preservation of futuredirected obligations that have not been fulfilled yet. Our starting point is a product of temporal and deontic ...
Jan Broersen, Julien Brunel
ATVA
2007
Springer
136views Hardware» more  ATVA 2007»
15 years 10 months ago
Symbolic Fault Tree Analysis for Reactive Systems
Fault tree analysis is a traditional and well-established technique for analyzing system design and robustness. Its purpose is to identify sets of basic events, called cut sets, wh...
Marco Bozzano, Alessandro Cimatti, Francesco Tappa...
144
Voted
CAV
2007
Springer
116views Hardware» more  CAV 2007»
15 years 10 months ago
A Decision Procedure for Bit-Vectors and Arrays
Abstract. STP is a decision procedure for the satisfiability of quantifier-free formulas in the theory of bit-vectors and arrays that has been optimized for large problems encoun...
Vijay Ganesh, David L. Dill