Sciweavers

3229 search results - page 111 / 646
» Theories with the Independence Property
Sort
View
114
Voted
NORDSEC
2009
Springer
15 years 7 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
94
Voted
FOIS
2006
15 years 2 months ago
A theory of granular parthood based on qualitative cardinality and size measures
We present a theory of granular parthood based on qualitative cardinality and size measures. Using standard mereological relations and qualitative, contextdependent relations such ...
Thomas Bittner, Maureen Donnelly
ICTAI
2010
IEEE
14 years 10 months ago
Revision Rules in the Theory of Evidence
Abstract--Combination rules proposed so far in the DempsterShafer theory of evidence, especially Dempster rule, rely on a basic assumption, that is, pieces of evidence being combin...
Jianbing Ma, Weiru Liu, Didier Dubois, Henri Prade
102
Voted
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 1 months ago
Toward a general theory of quantum games
We study properties of quantum strategies, which are complete specifications of a given party's actions in any multiple-round interaction involving the exchange of quantum in...
Gus Gutoski, John Watrous
138
Voted
RTA
2005
Springer
15 years 6 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen