Sciweavers

1210 search results - page 229 / 242
» Formal Techniques for Java Programs
Sort
View
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
ACL2
2006
ACM
14 years 1 months ago
Reasoning about ACL2 file input
We introduce the logical story behind file input in ACL2 and discuss the types of theorems that can be proven about filereading operations. We develop a low level library for re...
Jared Davis
KI
2004
Springer
14 years 26 days ago
Model Based Deduction for Database Schema Reasoning
Abstract. We aim to demonstrate that automated deduction techniques, in particular those following the model computation paradigm, are very well suited for database schema/query re...
Peter Baumgartner, Ulrich Furbach, Margret Gro&szl...
COOPIS
2002
IEEE
14 years 14 days ago
Well-Founded Optimism: Inheritance in Frame-Based Knowledge Bases
Abstract. F-logic is a popular formalism for knowledge-intensive applications and, especially, for ontology management in Semantic Web. However, the original F-logic’s semantics ...
Guizhen Yang, Michael Kifer
ACMSE
2000
ACM
13 years 12 months ago
Hyperscenarios: a framework for active narrative
Scenarios are narratives that illustrate future possibilities, such as proposed systems or plans, and help policy makers and designers choose among alternative courses of action. ...
Reginald L. Hobbs, Colin Potts