Sciweavers

290 search results - page 28 / 58
» Logical Properties of Name Restriction
Sort
View
CCS
2011
ACM
12 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
UML
2004
Springer
14 years 3 months ago
Supporting Model Refactorings Through Behaviour Inheritance Consistencies
Abstract. This paper addresses the problem of consistency preservation in model-driven software development. Software models typically embody many different views that need to be ...
Ragnhild Van Der Straeten, Viviane Jonckers, Tom M...
FM
1999
Springer
121views Formal Methods» more  FM 1999»
14 years 2 months ago
Incremental Design of a Power Transformer Station Controller Using a Controller Synthesis Methodology
ÐIn this paper, we describe the incremental specification of a power transformer station controller using a controller synthesis methodology. We specify the main requirements as s...
Hervé Marchand, Mazen Samaan
JOLLI
2008
95views more  JOLLI 2008»
13 years 10 months ago
Relational Modality
Saul Kripke's thesis that ordinary proper names are rigid designators is supported by widely shared intuitions about the occurrence of names in ordinary modal contexts. By th...
Kathrin Glüer, Peter Pagin
PADS
2006
ACM
14 years 3 months ago
Modeling Autonomous-System Relationships
The development of realistic topology generators that produce faithful replicas of Internet topologies is critical for conducting realistic simulation studies of Internet protocol...
Xenofontas A. Dimitropoulos, George F. Riley