Sciweavers

597 search results - page 108 / 120
» Formal Techniques for Java-Like Programs
Sort
View
RAID
2007
Springer
15 years 5 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
108
Voted
ACL2
2006
ACM
15 years 5 months ago
Reasoning about ACL2 file input
We introduce the logical story behind file input in ACL2 and discuss the types of theorems that can be proven about filereading operations. We develop a low level library for re...
Jared Davis
KI
2004
Springer
15 years 5 months ago
Model Based Deduction for Database Schema Reasoning
Abstract. We aim to demonstrate that automated deduction techniques, in particular those following the model computation paradigm, are very well suited for database schema/query re...
Peter Baumgartner, Ulrich Furbach, Margret Gro&szl...
COOPIS
2002
IEEE
15 years 4 months ago
Well-Founded Optimism: Inheritance in Frame-Based Knowledge Bases
Abstract. F-logic is a popular formalism for knowledge-intensive applications and, especially, for ontology management in Semantic Web. However, the original F-logic’s semantics ...
Guizhen Yang, Michael Kifer
ACMSE
2000
ACM
15 years 4 months ago
Hyperscenarios: a framework for active narrative
Scenarios are narratives that illustrate future possibilities, such as proposed systems or plans, and help policy makers and designers choose among alternative courses of action. ...
Reginald L. Hobbs, Colin Potts