Sciweavers

1036 search results - page 110 / 208
» Verification Programs for Abduction
Sort
View
CCS
2008
ACM
15 years 6 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
FORTE
2008
15 years 5 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
CLIMA
2006
15 years 5 months ago
Answer Set Programming for Representing and Reasoning About Virtual Institutions
It is recognised that institutions are potentially powerful means for making agent interactions effective and efficient, but institutions will only really be useful when, as in oth...
Owen Cliffe, Marina De Vos, Julian A. Padget
COMPUTER
2008
92views more  COMPUTER 2008»
15 years 4 months ago
Can Programming Be Liberated, Period?
higher, more appropriate, level of abstraction. It still entails writing programs, usually by using symbols, keywords, and operational instructions to tell the computer what we wan...
David Harel
REX
1990
15 years 8 months ago
Object-Oriented Programming Versus Abstract Data Types
Data Types William R. Cook Hewlett-Packard Laboratories 1501 Page Mill Road, Palo Alto, CA, 94303-0969, USA Abstract: This tutorial collects and elaborates arguments for distinguis...
William R. Cook