Sciweavers

1888 search results - page 108 / 378
» Proof theory and computational analysis
Sort
View
95
Voted
CCS
2006
ACM
15 years 4 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
EMSOFT
2007
Springer
15 years 6 months ago
Proving the absence of run-time errors in safety-critical avionics code
We explain the design of the interpretation-based static analyzer Astr´ee and its use to prove the absence of run-time errors in safety-critical codes. Categories and Subject Des...
Patrick Cousot
206
Voted
SIGMOD
2009
ACM
191views Database» more  SIGMOD 2009»
16 years 23 days ago
Scalable skyline computation using object-based space partitioning
The skyline operator returns from a set of multi-dimensional objects a subset of superior objects that are not dominated by others. This operation is considered very important in ...
Shiming Zhang, Nikos Mamoulis, David W. Cheung
96
Voted
ICCS
2005
Springer
15 years 6 months ago
Merge-Based Computation of Minimal Generators
Abstract. Minimal generators (mingens) of concept intents are valuable elements of the Formal Concept Analysis (FCA) landscape, which are widely used in the database field, for da...
Céline Frambourg, Petko Valtchev, Robert Go...
ENTCS
2008
91views more  ENTCS 2008»
15 years 18 days ago
Implementing Real Numbers With RZ
RZ is a tool which translates axiomatizations of mathematical structures to program specifications using the realizability interpretation of logic. This helps programmers correctl...
Andrej Bauer, Iztok Kavkler