Sciweavers

1864 search results - page 244 / 373
» Formal topology and domains
Sort
View
CSFW
2005
IEEE
14 years 3 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
14 years 3 months ago
Knowledge Ontology: A Method for Empirical Identification of 'As-Is' Contextual Knowledge
In this paper, we consider existing approaches to ontology definition and validation. Popular techniques include the use of domain experts or reliance on formal logic. We consider...
Theresa Edgington, T. S. Raghu, Ajay S. Vinze
SEW
2005
IEEE
14 years 3 months ago
Bridging the Gap between Systems Design
A challenging problem for software engineering practitioners is moving from high-level system architectures produced by system engineers to deployable software produced by softwar...
David Garlan, William K. Reinholtz, Bradley R. Sch...
ATAL
2005
Springer
14 years 3 months ago
Verifying Norm Compliancy of Protocols
There is a wide agreement on the use of norms in order to specify the expected behaviour of agents in open MAS. However, in highly regulated domains, where norms dictate what can a...
Huib Aldewereld, Javier Vázquez-Salceda, Fr...
CP
2005
Springer
14 years 3 months ago
Sub-optimality Approximations
Abstract. The sub-optimality approximation problem considers an optimization problem O, its optimal solution σ∗ , and a variable x with domain {d1, . . . , dm} and returns appro...
Russell Bent, Irit Katriel, Pascal Van Hentenryck