Sciweavers

5255 search results - page 964 / 1051
» Formal Methods for Privacy
Sort
View
JCIT
2008
129views more  JCIT 2008»
13 years 10 months ago
A New Rule Scheduling Approach based on Estimation of Rule Execution Probability in Active Database
Active database systems (ADBS) can, automatically, react to the occurrence of predefined events by definition a collection of active rules. One of the most important modules of AD...
Abbas Rasoolzadegan, Rohollah Alesheykh, Ahmad Abd...
INFFUS
2006
101views more  INFFUS 2006»
13 years 10 months ago
Fusion rules for merging uncertain information
In previous papers, we have presented a logic-based framework based on fusion rules for merging structured news reports [Hun00, Hun02b, Hun02a, HS03, HS04]. Structured news report...
Anthony Hunter, Weiru Liu
JALC
2006
87views more  JALC 2006»
13 years 10 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
JRTIP
2008
249views more  JRTIP 2008»
13 years 10 months ago
Model-based mapping of reconfigurable image registration on FPGA platforms
Abstract Image registration is a computationally intensive application in the medical imaging domain that places stringent requirements on performance and memory management efficie...
Mainak Sen, Yashwanth Hemaraj, William Plishker, R...
MAGS
2008
169views more  MAGS 2008»
13 years 10 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi