Sciweavers

2517 search results - page 114 / 504
» Specifying Weak Sets
Sort
View
SDMW
2004
Springer
15 years 10 months ago
Abstracting and Refining Authorization in SQL
ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to unders...
Arnon Rosenthal, Edward Sciore
ATAL
2003
Springer
15 years 10 months ago
Expressive global protocols via logic-based electronic institutions
Communication is the key feature of Multi-agent Systems. The interactions among components of a system may take many distinct forms of increasing complexity such as in auctions, n...
Wamberto Weber Vasconcelos
WMCSA
1999
IEEE
15 years 9 months ago
Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms
This paper addresses the problem of geocasting in mobile ad hoc network (MANET) environments. Geocasting is a variant of the conventional multicasting problem. For multicasting, c...
Young-Bae Ko, Nitin H. Vaidya
CAV
2010
Springer
214views Hardware» more  CAV 2010»
15 years 9 months ago
Comfusy: A Tool for Complete Functional Synthesis
Synthesis of program fragments from specifications can make programs easier to write and easier to reason about. We present Comfusy, a tool that extends the compiler for the gener...
Viktor Kuncak, Mikaël Mayer, Ruzica Piskac, P...
ICSE
2000
IEEE-ACM
15 years 9 months ago
Graphical animation of behavior models
Graphical animation is a way of visualizing the behavior of design models. This visualization is of use in validating a design model against informally specified requirements and ...
Jeff Magee, Nat Pryce, Dimitra Giannakopoulou, Jef...