Sciweavers

2043 search results - page 291 / 409
» Reasoning About Security Models
Sort
View
99
Voted
IJCAI
1989
15 years 1 months ago
Constraint Posting for Verifying VLSI Circuits
We apply constraint posting to the problem of reasoning about function from structure. Constraint posting is a technique used by some planners to coordinate decisions. At each dec...
Daniel Weise
ASWC
2009
Springer
15 years 1 months ago
Semantic Rules on Drug Discovery Data
Aggregating and presenting a wide variety of information pertinent to the biological and pharmacological effects of chemical compounds will be a critical part of 21st century drug ...
Sashikiran Challa, David J. Wild, Ying Ding, Qian ...
98
Voted
ATAL
2010
Springer
15 years 1 months ago
Strategic planning for probabilistic games with incomplete information
Alternating-time Temporal Logic (ATL) [1] is used to reason about strategic abilities of agents. Aiming at strategies that can realistically be implemented in software, many varia...
Henning Schnoor
106
Voted
ECAI
2010
Springer
15 years 1 months ago
Majority Merging: from Boolean Spaces to Affine Spaces
Abstract. This paper is centered on the problem of merging (possibly conflicting) information coming from different sources. Though this problem has attracted much attention in pro...
Jean-François Condotta, Souhila Kaci, Pierr...
97
Voted
CORR
2010
Springer
77views Education» more  CORR 2010»
15 years 25 days ago
Sound Bisimulations for Higher-Order Distributed Process Calculus
Abstract. While distributed systems with transfer of processes have become pervasive, methods for reasoning about their behaviour are underdeveloped. In this paper we develop a bis...
Adrien Piérard, Eijiro Sumii