Sciweavers

2043 search results - page 336 / 409
» Reasoning About Security Models
Sort
View
POPL
2010
ACM
15 years 24 days ago
Nested interpolants
In this paper, we explore the potential of the theory of nested words for partial correctness proofs of recursive programs. Our conceptual contribution is a simple framework that ...
Matthias Heizmann, Jochen Hoenicke, Andreas Podels...
95
Voted
AAMAS
2007
Springer
15 years 22 days ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh
116
Voted
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 21 days ago
Join Bayes Nets: A new type of Bayes net for relational data
Many real-world data are maintained in relational format, with different tables storing information about entities and their links or relationships. The structure (schema) of the ...
Oliver Schulte, Hassan Khosravi, Flavia Moser, Mar...
ENTCS
2008
175views more  ENTCS 2008»
15 years 20 days ago
AGAPIA v0.1: A Programming Language for Interactive Systems and Its Typing System
A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, programming a...
Cezara Dragoi, Gheorghe Stefanescu
75
Voted
IJIM
2008
60views more  IJIM 2008»
15 years 18 days ago
The Role of Podcasts in Students' Learning
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can ac...
Laurel Evelyn Dyson