Sciweavers

2873 search results - page 483 / 575
» Model Checking and the Mu-calculus
Sort
View
ICLP
1987
Springer
13 years 11 months ago
Near-Horn PROLOG
The Near-Horn Prolog procedures have been proposed as e ective procedures in the area of disjunctive logic programming, an extension of logic programming to the ( rstorder) non-Ho...
Donald W. Loveland
FAST
2008
13 years 10 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
WSC
2008
13 years 10 months ago
Emergence of simulations for manufacturing line designs in Japanese automobile manufacturing plants
The aim of this research is to introduce the reader to a new perspective on the framework for designing a manufacturing line project in Japanese automobile manufacturing plants. A...
Minh Dang Nguyen, Soemon Takakuwa
CAV
2008
Springer
108views Hardware» more  CAV 2008»
13 years 10 months ago
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis
This paper addresses the analysis of concurrent programs with shared memory. Such an analysis is undecidable in the presence of multiple procedures. One approach used in recent wor...
Akash Lal, Thomas W. Reps
CCS
2008
ACM
13 years 10 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...