Sciweavers

95 search results - page 10 / 19
» On Notions of Completeness Weaker than Kripke Completeness
Sort
View
TKDE
2010
159views more  TKDE 2010»
13 years 8 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
CONCUR
2009
Springer
14 years 4 months ago
Winning Regions of Pushdown Parity Games: A Saturation Method
We present a new algorithm for computing the winning region of a parity game played over the configuration graph of a pushdown system. Our method gives the first extension of the...
Matthew Hague, C.-H. Luke Ong
CIE
2005
Springer
14 years 3 months ago
How to Compare the Power of Computational Models
We argue that there is currently no satisfactory general framework for comparing the extensional computational power of arbitrary computational models operating over arbitrary doma...
Udi Boker, Nachum Dershowitz
AAAI
1992
13 years 11 months ago
Concurrent Actions in the Situation Calculus
We propose a representation of concurrent actions; rather than invent a new formalism, we model them within the standard situation calculus by introducing the notions of global ac...
Fangzhen Lin, Yoav Shoham
ENTCS
2007
108views more  ENTCS 2007»
13 years 10 months ago
Remarks on Testing Probabilistic Processes
We develop a general testing scenario for probabilistic processes, giving rise to two theories: probabilistic may testing and probabilistic must testing. These are applied to a si...
Yuxin Deng, Rob J. van Glabbeek, Matthew Hennessy,...