Sciweavers

1461 search results - page 270 / 293
» Analysis of Constraint Logic Programs
Sort
View
HT
2000
ACM
14 years 1 days ago
Making a successful case for a hypertextual doctoral dissertation
In August of 1998 I completed the first hypertextual dissertation at Rensselaer Polytechnic Institute. The dissertation was a case study applying methods of rhetorical analysis an...
Christine Boese
ATVA
2008
Springer
144views Hardware» more  ATVA 2008»
13 years 9 months ago
Tests, Proofs and Refinements
1 : Logic in Specification and Verification (abstract) Natarajan Shankar (SRI) Session Chair : Sungdeok Cha 12 : 00 13 : 00 Lunch 13 : 00 15 : 00 2 : Boolean Modeling of Cell Biolo...
Sriram K. Rajamani
BMCBI
2010
135views more  BMCBI 2010»
13 years 7 months ago
Integration and visualization of systems biology data in context of the genome
Background: High-density tiling arrays and new sequencing technologies are generating rapidly increasing volumes of transcriptome and protein-DNA interaction data. Visualization a...
J. Christopher Bare, Tie Koide, David J. Reiss, Da...
CI
2000
114views more  CI 2000»
13 years 7 months ago
A Guided Tour through Some Extensions of the Event Calculus
Kowalski and Sergot's Event Calculus (EC) is a simple temporal formalism that, given a set of event occurrences, derives the maximal validity intervals (MVIs) over which prop...
Iliano Cervesato, Massimo Franceschet, Angelo Mont...
ESOP
2004
Springer
14 years 1 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...