Sciweavers

2038 search results - page 290 / 408
» Loops under Strategies
Sort
View
TARK
2007
Springer
15 years 10 months ago
A normal simulation of coalition logic and an epistemic extension
In this paper we show how coalition logic can be reduced to the fusion of a normal modal STIT logic for agency and a standard normal temporal logic for discrete time, and how this...
Jan Broersen, Andreas Herzig, Nicolas Troquard
116
Voted
ACSAC
2006
IEEE
15 years 10 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
AHS
2006
IEEE
138views Hardware» more  AHS 2006»
15 years 10 months ago
Generalized Disjunction Decomposition for the Evolution of Programmable Logic Array Structures
Evolvable hardware refers to a self reconfigurable electronic circuit, where the circuit configuration is under the control of an evolutionary algorithm. Evolvable hardware has sh...
Emanuele Stomeo, Tatiana Kalganova, Cyrille Lamber...
CSFW
2006
IEEE
15 years 10 months ago
Cryptographically Sound Theorem Proving
We describe a faithful embedding of the Dolev-Yao model of Backes, Pfitzmann, and Waidner (CCS 2003) in the theorem prover Isabelle/HOL. This model is cryptographically sound in ...
Christoph Sprenger, Michael Backes, David A. Basin...
HICSS
2006
IEEE
130views Biometrics» more  HICSS 2006»
15 years 10 months ago
Governance of the IT Function: Valuing Agility and Quality of Training, Cooperation and Communications
It has long been argued that the organizational structure and reporting relationships of the IT functional area profoundly affects organizational performance. However, since most ...
Felipe Csaszar, Eric K. Clemons