Sciweavers

733 search results - page 85 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
FROCOS
2005
Springer
15 years 5 months ago
A Concurrent Lambda Calculus with Futures
Reasoning about the correctness of program transformations requires a notion of program equivalence. We present an observational semantics for the concurrent lambda calculus with f...
Joachim Niehren, Jan Schwinghammer, Gert Smolka
IEEEPACT
2000
IEEE
15 years 4 months ago
Fine Grained Multithreading with Process Calculi
ÐThis paper presents a multithreaded abstract machine for the TyCO process calculus. We argue that process calculi provide a powerful framework to reason about fine-grained parall...
Luís M. B. Lopes, Fernando M. A. Silva, Vas...
KI
1997
Springer
15 years 4 months ago
Agents in Proactive Environments
Abstract. Agents situated in proactive environments are acting autonomously while the environment is evolving alongside, whether or not the agents carry out any particular actions....
Dov M. Gabbay, Rolf Nossum, Michael Thielscher
LATA
2009
Springer
15 years 6 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig
CEAS
2006
Springer
15 years 3 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...