Sciweavers

1941 search results - page 297 / 389
» Reasoning about Computations Using Two-Levels of Logic
Sort
View
128
Voted
ICDT
2007
ACM
112views Database» more  ICDT 2007»
15 years 9 months ago
Commutativity Analysis in XML Update Languages
Abstract. A common approach to XML updates is to extend XQuery with update operations. This approach results in very expressive languages which are convenient for users but are dif...
Giorgio Ghelli, Kristoffer Høgsbro Rose, J&...
JAIR
2008
138views more  JAIR 2008»
15 years 3 months ago
Networks of Influence Diagrams: A Formalism for Representing Agents' Beliefs and Decision-Making Processes
This paper presents Networks of Influence Diagrams (NID), a compact, natural and highly expressive language for reasoning about agents' beliefs and decision-making processes....
Ya'akov Gal, Avi Pfeffer
ESORICS
2005
Springer
15 years 9 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
123
Voted
SIGIR
2004
ACM
15 years 9 months ago
Belief revision for adaptive information retrieval
Applying Belief Revision logic to model adaptive information retrieval is appealing since it provides a rigorous theoretical foundation to model partiality and uncertainty inheren...
Raymond Y. K. Lau, Peter Bruza, Dawei Song
131
Voted
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 3 months ago
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols
ion for Epistemic Model Checking of Dining Cryptographers-based Protocols Omar I. Al-Bataineh and Ron van der Meyden School of Computer Science and Engineering, University of New S...
Omar I. Al-Bataineh, Ron van der Meyden