Sciweavers

2501 search results - page 352 / 501
» Logics with Rank Operators
Sort
View
TIME
2005
IEEE
15 years 10 months ago
A Local Method for Prioritized Fusion of Temporal Information
Information often comes from different sources and merging these sources usually leads to the apparition of inconsistencies. Fusion is the operation which consists in restoring th...
Mahat Khelfallah, Belaid Benhamou
CAV
2005
Springer
133views Hardware» more  CAV 2005»
15 years 10 months ago
On Statistical Model Checking of Stochastic Systems
Statistical methods to model check stochastic systems have been, thus far, developed only for a sublogic of continuous stochastic logic (CSL) that does not have steady state operat...
Koushik Sen, Mahesh Viswanathan, Gul Agha
CCS
2005
ACM
15 years 10 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
DALT
2005
Springer
15 years 10 months ago
Beliefs in Agent Implementation
Abstract. This paper extends a programming language for implementing cognitive agents with the capability to explicitly represent beliefs and reason about them. In this programming...
Laurens Winkelhagen, Mehdi Dastani, Jan Broersen
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 10 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva