Sciweavers

3032 search results - page 468 / 607
» Description Logic Rules
Sort
View
MDM
2004
Springer
14 years 4 months ago
Multi-Protocol Profiles to Support User Mobility Across Network Technologies
Seamless roaming in heterogeneous circuit-switched and IP networks is key for successful migration towards all-IP. The Unified Mobility Manager (UMM) keeps track of users’ locat...
Oliver Haase, Ming Xiong, Kazutaka Murakami
ICTAI
2003
IEEE
14 years 3 months ago
An Intelligent Early Warning System for Software Quality Improvement and Project Management
One of the main reasons behind unfruitful software development projects is that it is often too late to correct the problems by the time they are detected. It clearly indicates th...
Xiaoqing Frank Liu, Gautam Kane, Monu Bambroo
CCS
2003
ACM
14 years 3 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
FM
2003
Springer
108views Formal Methods» more  FM 2003»
14 years 3 months ago
Correctness of Source-Level Safety Policies
Abstract. Program certification techniques formally show that programs satisfy certain safety policies. They rely on the correctness of the safety policy which has to be establish...
Ewen Denney, Bernd Fischer 0002
ICSE
2010
IEEE-ACM
14 years 3 months ago
LSdiff: a program differencing tool to identify systematic structural differences
Program differencing tools such as GNU diff identify individual differences but do not determine how those differences are related to each other. For example, an extract super...
Alex Loh, Miryung Kim