Sciweavers

1036 search results - page 61 / 208
» Verification Programs for Abduction
Sort
View
111
Voted
ICLP
2009
Springer
15 years 7 months ago
Stabilization of Information Sharing for Queries Answering in Multiagent Systems
We consider multiagent systems situated in unpredictable environments. Agents viewed as abductive logic programs with abducibles being literals the agent could sense or receive fro...
Phan Minh Dung, Do Duc Hanh, Phan Minh Thang
93
Voted
GC
2004
Springer
15 years 6 months ago
The KGP Model of Agency for Global Computing: Computational Model and Prototype Implementation
Abstract. We present the computational counterpart of the KGP (Knowledge, Goals, Plan) declarative model of agency for Global Computing. In this context, a computational entity is ...
Andrea Bracciali, Neophytos Demetriou, Ulrich Endr...
214
Voted
POPL
2008
ACM
16 years 1 months ago
Relevance heuristics for program analysis
Relevance heuristics allow us to tailor a program analysis to a particular property to be verified. This in turn makes it possible to improve the precision of the analysis where n...
Kenneth L. McMillan
SIGSOFT
2007
ACM
16 years 1 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
125
Voted
TOPLAS
2008
138views more  TOPLAS 2008»
15 years 20 days ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...