Sciweavers

4382 search results - page 771 / 877
» Query by Semantic Example
Sort
View
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
DALT
2006
Springer
15 years 6 months ago
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
Agents in an open system interact with each other based on (typically, published) protocols. An agent may, however, deviate from the protocol because of its internal policies. Such...
Amit K. Chopra, Munindar P. Singh
107
Voted
ESWS
2006
Springer
15 years 6 months ago
Modelling Ontology Evaluation and Validation
We present a comprehensive approach to ontology evaluation and validation, which have become a crucial problem for the development of semantic technologies. Existing evaluation met...
Aldo Gangemi, Carola Catenacci, Massimiliano Ciara...
FM
2006
Springer
127views Formal Methods» more  FM 2006»
15 years 6 months ago
Using Domain-Independent Problems for Introducing Formal Methods
Abstract. The key to the integration of formal methods into engineering practice is education. In teaching, domain-independent problems -i.e., not requiring prior engineering backg...
Raymond T. Boute
FORMATS
2006
Springer
15 years 6 months ago
Integrating Discrete- and Continuous-Time Metric Temporal Logics Through Sampling
Abstract. Real-time systems usually encompass parts that are best described by a continuous-time model, such as physical processes under control, together with other components tha...
Carlo A. Furia, Matteo Rossi