Sciweavers

1941 search results - page 278 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
178
Voted
TASE
2008
IEEE
15 years 3 months ago
Modeling and Supervisory Control of Railway Networks Using Petri Nets
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...
Alessandro Giua, Carla Seatzu
115
Voted
CAV
2010
Springer
197views Hardware» more  CAV 2010»
15 years 7 months ago
Abstract Analysis of Symbolic Executions
Analysis of Symbolic Executions Aws Albarghouthi1 , Arie Gurfinkel2 , Ou Wei1,3 , and Marsha Chechik1 1 Department of Computer Science, University of Toronto, Canada 2 Software Eng...
Aws Albarghouthi, Arie Gurfinkel, Ou Wei, Marsha C...
CONCUR
2012
Springer
13 years 6 months ago
Making Weighted Containment Feasible: A Heuristic Based on Simulation and Abstraction
Simulation and Abstraction Guy Avni and Orna Kupferman School of Computer Science and Engineering, Hebrew University, Israel Weighted automata map input words to real numbers and a...
Guy Avni, Orna Kupferman
142
Voted
SAC
2004
ACM
15 years 9 months ago
A method to define an Enterprise Architecture using the Zachman Framework
The proliferation of IT and its consequent dispersion is an enterprise reality, however, most organizations do not have adequate tools and/or methodologies that enable the managem...
Carla Marques Pereira, Pedro Sousa
169
Voted
PODS
2008
ACM
174views Database» more  PODS 2008»
16 years 3 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...