Sciweavers

1210 search results - page 229 / 242
» Formal Techniques for Java Programs
Sort
View
120
Voted
RAID
2007
Springer
15 years 8 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
ACL2
2006
ACM
15 years 7 months ago
Reasoning about ACL2 file input
We introduce the logical story behind file input in ACL2 and discuss the types of theorems that can be proven about filereading operations. We develop a low level library for re...
Jared Davis
103
Voted
KI
2004
Springer
15 years 7 months ago
Model Based Deduction for Database Schema Reasoning
Abstract. We aim to demonstrate that automated deduction techniques, in particular those following the model computation paradigm, are very well suited for database schema/query re...
Peter Baumgartner, Ulrich Furbach, Margret Gro&szl...
136
Voted
COOPIS
2002
IEEE
15 years 6 months ago
Well-Founded Optimism: Inheritance in Frame-Based Knowledge Bases
Abstract. F-logic is a popular formalism for knowledge-intensive applications and, especially, for ontology management in Semantic Web. However, the original F-logic’s semantics ...
Guizhen Yang, Michael Kifer
ACMSE
2000
ACM
15 years 6 months ago
Hyperscenarios: a framework for active narrative
Scenarios are narratives that illustrate future possibilities, such as proposed systems or plans, and help policy makers and designers choose among alternative courses of action. ...
Reginald L. Hobbs, Colin Potts