Sciweavers

222 search results - page 34 / 45
» A Formal Verification Methodology for Checking Data Integrit...
Sort
View
140
Voted
JCS
2010
80views more  JCS 2010»
14 years 10 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
143
Voted
TCBB
2008
137views more  TCBB 2008»
15 years 3 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
132
Voted
BMCBI
2007
93views more  BMCBI 2007»
15 years 3 months ago
Representing default knowledge in biomedical ontologies: application to the integration of anatomy and phenotype ontologies
Background: Current efforts within the biomedical ontology community focus on achieving interoperability between various biomedical ontologies that cover a range of diverse domain...
Robert Hoehndorf, Frank Loebe, Janet Kelso, Heinri...
160
Voted
POPL
2010
ACM
15 years 6 months ago
Programming with angelic nondeterminism
Angelic nondeterminism can play an important role in program development. It simplifies specifications, for example in deriving programs with a refinement calculus; it is the form...
Rastislav Bodík, Satish Chandra, Joel Galen...
136
Voted
ATAL
2008
Springer
15 years 5 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...