Sciweavers

223 search results - page 32 / 45
» Multi-Valued Model Checking via Classical Model Checking
Sort
View
AGP
2010
IEEE
15 years 1 months ago
The Transformational Approach to Program Development
We present an overview of the program transformation techniques which have been proposed over the past twenty-five years in the context of logic programming. We consider the appro...
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...
AAAI
1996
14 years 10 months ago
Trajectory Constraints in Qualitative Simulation
We present a method for specifying temporal constraints on trajectories of dynamical systems and enforcing them during qualitative simulation. This capability can be used to focus...
Giorgio Brajnik, Daniel J. Clancy
IJISEC
2008
119views more  IJISEC 2008»
14 years 9 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
ICTAC
2005
Springer
15 years 3 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...
CP
2004
Springer
15 years 2 months ago
Controllability of Soft Temporal Constraint Problems
In real-life temporal scenarios, uncertainty and preferences are often essential, coexisting aspects. We present a formalism where temporal constraints with both preferences and un...
Francesca Rossi, Kristen Brent Venable, Neil Yorke...