Sciweavers

1948 search results - page 62 / 390
» Formalizing Mirror Theory
Sort
View
ICRE
2000
IEEE
14 years 2 months ago
Requirements Documentation: Why a Formal Basis is Essential
Unless you have a complete and precise description of your product’s requirements, it is very unlikely that you will satisfy those requirements. A requirements document that is ...
David Lorge Parnas
KR
2000
Springer
14 years 1 months ago
Reasoning with Axioms: Theory and Practice
When reasoning in description, modal or temporal logics it is often useful to consider axioms representing universal truths in the domain of discourse. Reasoning with respect to a...
Ian Horrocks, Stephan Tobies
CCS
2011
ACM
12 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
FROCOS
2007
Springer
14 years 4 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CHI
2009
ACM
14 years 10 months ago
Social responses in mobile messaging: influence strategies, self-disclosure, and source orientation
This paper reports on a direct test of social responses to communication technologies theory (SRCT) with mobile messaging. SRCT predicts that people will mindlessly respond to com...
Attapol Thamrongrattanarit, B. J. Fogg, Claire Car...