Sciweavers

2153 search results - page 103 / 431
» From Requirements Models to Formal Specifications in B
Sort
View
ASM
2008
ASM
13 years 11 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
ICDCSW
2006
IEEE
14 years 3 months ago
Fault-Tolerance Verification of the Fluids and Combustion Facility of the International Space Station
The Fluids and Combustion Facility (FCF) will be a permanent modular, multi-user facility used to accommodate microgravity science experiments in the U.S. Laboratory Module onboar...
Raquel S. Whittlesey-Harris, Mikhail Nesterenko
AAAI
2006
13 years 10 months ago
Preference Elicitation and Generalized Additive Utility
Any automated decision support software must tailor its actions or recommendations to the preferences of different users. Thus it requires some representation of user preferences ...
Darius Braziunas, Craig Boutilier
ENTCS
2010
103views more  ENTCS 2010»
13 years 6 months ago
Model Testing Asynchronously Communicating Objects using Modulo AC Rewriting
Testing and verification of asynchronously communicating objects in open environments are challenging due to non-determinism. We explore a formal approach for black-box testing by...
Olaf Owe, Martin Steffen, Arild B. Torjusen
AIME
2007
Springer
14 years 3 months ago
Learning Medical Ontologies from the Web
The development of intelligent healthcare support systems always requires a formalization of medical knowledge. Domain ontologies are especially suitable for this purpose but their...
David Sánchez, Antonio Moreno