Abstract. We present a description technique for the correct construction of programs that allows us to de ne terms like re nement, modelchecking, and synthesis as special operatio...
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...
The aim of this paper is to study how preferences, which are used to model intrinsic strengths of arguments, can be used in argumentation. We show that they play two roles: i) to r...
—Stochastic relaxation aims at finding the minimum of a fitness function by identifying a proper sequence of distributions, in a given model, that minimize the expected value o...