Sciweavers

4224 search results - page 736 / 845
» Reasoning about Choice
Sort
View
EDBT
1990
ACM
108views Database» more  EDBT 1990»
15 years 4 months ago
Deductive Databases - Theory Meets Practice
Deductive Databases are coming of age with the emergence of efficient and easy to use systems that support queries, reasoning, and application development on databases through dec...
Carlo Zaniolo
112
Voted
ECSQARU
2007
Springer
15 years 4 months ago
Approaches to Constructing a Stratified Merged Knowledge Base
Many merging operators have been proposed to merge either flat or stratified knowledge bases. The result of merging by such an operator is a flat base (or a set of models of the me...
Anbu Yue, Weiru Liu, Anthony Hunter
109
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 4 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICLP
2007
Springer
15 years 4 months ago
Web Sites Verification: An Abductive Logic Programming Tool
We present the CIFFWEB system, an innovative tool for the verification of web sites, relying upon abductive logic programming. The system allows the user to define rules that a web...
Paolo Mancarella, Giacomo Terreni, Francesca Toni
79
Voted
ICSE
2000
IEEE-ACM
15 years 4 months ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...