Sciweavers

5255 search results - page 1028 / 1051
» Formal Methods for Privacy
Sort
View
ECAI
2000
Springer
14 years 1 days ago
An Embedding of ConGolog in 3APL
Several high-level programming languages for programming agents and robots have been proposed in recent years. Each of these languages has its own features and merits. It is still...
Koen V. Hindriks, Yves Lespérance, Hector J...
EPIA
1999
Springer
13 years 12 months ago
Improving Optical Music Recognition by Means of Abductive Constraint Logic Programming
In this paper we propose a hybrid system that bridges the gap between traditional image processing methods, used for low-level object recognition, and abductive constraint logic pr...
Miguel Ferrand, João Alexandre Leite, Am&ia...
RTCSA
1999
IEEE
13 years 12 months ago
A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications
ASTRAL is a high-level formal specification language for real-time (infinite state) systems. It is provided with structuring mechanisms that allow one to build modularized specifi...
Zhe Dang, Richard A. Kemmerer
FMLDO
1999
Springer
137views Database» more  FMLDO 1999»
13 years 12 months ago
Federated Transaction Management with Snapshot Isolation
Federated transaction management (also known as multidatabase transaction management in the literature) is needed to ensure the consistency of data that is distributed across mult...
Ralf Schenkel, Gerhard Weikum, Norbert Weiße...
STACS
1999
Springer
13 years 12 months ago
The Weakness of Self-Complementation
Model checking is a method for the verification of systems with respect to their specifications. Symbolic model-checking, which enables the verification of large systems, procee...
Orna Kupferman, Moshe Y. Vardi
« Prev « First page 1028 / 1051 Last » Next »