Sciweavers

1536 search results - page 61 / 308
» The Underlying Logic of Hoare Logic
Sort
View
CADE
2009
Springer
15 years 10 months ago
Computing Knowledge in Security Protocols under Convergent Equational Theories
In the symbolic analysis of security protocols, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems. We propose a proce...
Stéphanie Delaune, Stefan Ciobâca, St...
TIME
2007
IEEE
15 years 4 months ago
On Construction of Holistic Synopses under the Duplicate Semantics of Streaming Queries
Transaction-time temporal databases and query languages provide a solid framework for analyzing properties of queries over data streams. In this paper we focus on issues connected...
David Toman
AAAI
2006
14 years 11 months ago
Merging Stratified Knowledge Bases under Constraints
In this paper, we propose a family of operators for merging stratified knowledge bases under integrity constraints. The operators are defined in a model-theoretic way. Our merging...
Guilin Qi, Weiru Liu, David A. Bell
RSCTC
2004
Springer
157views Fuzzy Logic» more  RSCTC 2004»
15 years 3 months ago
Rough Approximations under Level Fuzzy Sets
The combination of fuzzy set and rough set theories lead to various models. Functional and set approaches are two categories based on different fuzzy representations. In this pape...
W.-N. Liu, Jingtao Yao, Yiyu Yao
CADE
2003
Springer
15 years 10 months ago
A Principle for Incorporating Axioms into the First-Order Translation of Modal Formulae
In this paper we present a translation principle, called the axiomatic translation, for reducing propositional modal logics with background theories, including triangular propertie...
Renate A. Schmidt, Ullrich Hustadt