Sciweavers

1156 search results - page 129 / 232
» Compositional Methods for Information-Hiding
Sort
View
ICECCS
2007
IEEE
89views Hardware» more  ICECCS 2007»
14 years 27 days ago
Just-in-Time Certification
Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper ...
John M. Rushby
ER
2006
Springer
149views Database» more  ER 2006»
14 years 21 days ago
Automatic Creation of Web Services from Extraction Ontologies
Abstract. The Semantic Web promises to provide timely, targeted access to user-specified information online. Though standardized services exist for performing this work, specifying...
Cui Tao, Yihong Ding, Deryle W. Lonsdale
FMCAD
2000
Springer
14 years 19 days ago
The Semantics of Verilog Using Transition System Combinators
Abstract. Since the advent of model checking it is becoming more common for languages to be given a semantics in terms of transition systems. Such semantics allow to model check pr...
Gordon J. Pace
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 10 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
APVIS
2008
13 years 10 months ago
Visual Statistics for Collections of Clustered Graphs
We propose a method to visually summarize collections of networks on which a clustering of the vertices is given. Our method allows for efficient comparison of individual networks...
Ulrik Brandes, Jürgen Lerner, Miranda J. Lubb...