Sciweavers

733 search results - page 97 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
MEDINFO
2007
102views Healthcare» more  MEDINFO 2007»
15 years 1 months ago
Automatic Treatment of Temporal Issues in Clinical Guidelines in the GLARE System
Temporal constraints play a fundamental role in clinical guidelines. For example, temporal indeterminacy, constraints about duration, delays between actions and periodic repetitio...
Luca Anselma, Paolo Terenziani, Stefania Montani, ...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
WADT
1998
Springer
15 years 3 months ago
An Algebra of Graph Derivations Using Finite (co-) Limit Double Theories
Graph transformation systems have been introduced for the formal specification of software systems. States are thereby modeled as graphs, and computations as graph derivations acco...
Andrea Corradini, Martin Große-Rhode, Reiko ...
IUI
2006
ACM
15 years 5 months ago
Who's asking for help?: a Bayesian approach to intelligent assistance
Automated software customization is drawing increasing attention as a means to help users deal with the scope, complexity, potential intrusiveness, and ever-changing nature of mod...
Bowen Hui, Craig Boutilier
CORR
2011
Springer
186views Education» more  CORR 2011»
14 years 6 months ago
A Goal-Directed Implementation of Query Answering for Hybrid MKNF Knowledge Bases
Ontologies and rules are usually loosely coupled in knowledge representation formalisms. In fact, ontologies use open-world reasoning while the leading semantics for rules use non...
Ana Sofia Gomes, José Júlio Alferes,...