Sciweavers

622 search results - page 38 / 125
» Answer Set Programming and Bounded Model Checking
Sort
View
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 12 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
APLAS
2009
ACM
14 years 2 months ago
On the Decidability of Subtyping with Bounded Existential Types
Bounded existential types are a powerful language feature ling partial data abstraction and information hiding. However, existentials do not mingle well with subtyping as found in ...
Stefan Wehr, Peter Thiemann
SLP
1994
89views more  SLP 1994»
13 years 9 months ago
Signed Logic Programs
In this paper we explore the notion of a \signing" of a logic program, in the framework of the answer set semantics. In particular, we generalize and extend the notion of a s...
Hudson Turner
IJFCS
2006
110views more  IJFCS 2006»
13 years 8 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
ISORC
2005
IEEE
14 years 1 months ago
RMMC Programming Model and Support Execution Engine in the TMO Programming Scheme
: While the conventional remote method invocation mechanism has been considered for a long time as the primary approach for facilitating interactions among real-time objects, a mul...
K. H. (Kane) Kim, Yuqing Li, Sheng Liu, Moon-hae K...