Sciweavers

2111 search results - page 205 / 423
» How to Program Pervasive Systems
Sort
View
114
Voted
UTP
2010
15 years 1 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
106
Voted
GECCO
2003
Springer
15 years 8 months ago
Structural Emergence with Order Independent Representations
Abstract. This paper compares two grammar based Evolutionary Automatic Programming methods, Grammatical Evolution (GE) and Chorus. Both systems evolve sequences of derivation rules...
R. Muhammad Atif Azad, Conor Ryan
CAV
2001
Springer
119views Hardware» more  CAV 2001»
15 years 8 months ago
Certifying Model Checkers
Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time properties, a model checker produces a counterexample comput...
Kedar S. Namjoshi
153
Voted
TPLP
2002
117views more  TPLP 2002»
15 years 3 months ago
On Properties of Update Sequences Based on Causal Rejection
In this paper, we consider an approach to update nonmonotonic knowledge bases represented as extended logic programs under the answer set semantics. In this approach, new informat...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...
207
Voted
POPL
2012
ACM
13 years 11 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama