Sciweavers

1097 search results - page 115 / 220
» Revision Programming = Logic Programming Integrity Constra...
Sort
View
132
Voted
MICAI
2000
Springer
15 years 7 months ago
Knowledge Representation Using High-Level Non-monotonic Reasoning
We introduce the new paradigm of High-Level Non-Monotonic reasoning (HLNM). This paradigm is the consolidation of our recent results on disjunctions, sets, explicit and implicit ne...
Mauricio Osorio, Juan Carlos Nieves, Fernando Zaca...
125
Voted
ERSA
2009
109views Hardware» more  ERSA 2009»
15 years 1 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
132
Voted
SAS
2004
Springer
132views Formal Methods» more  SAS 2004»
15 years 8 months ago
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language
Abstract. This paper addresses the problem of checking programs written in an object-oriented language to ensure that they satisfy the information flow policies, confidentiality ...
Qi Sun, Anindya Banerjee, David A. Naumann
144
Voted
PLDI
2009
ACM
15 years 10 months ago
Snugglebug: a powerful approach to weakest preconditions
Symbolic analysis shows promise as a foundation for bug-finding, specification inference, verification, and test generation. This paper addresses demand-driven symbolic analysi...
Satish Chandra, Stephen J. Fink, Manu Sridharan
ECAI
2010
Springer
15 years 4 months ago
Tractable Reasoning with DL-Programs over Datalog-rewritable Description Logics
Abstract. The deployment of KR formalisms to the Web has created the need for formalisms that combine heterogeneous knowledge bases. Nonmonotonic dl-programs provide a loose integr...
Stijn Heymans, Thomas Eiter, Guohui Xiao