Sciweavers

2303 search results - page 439 / 461
» On the logic of argumentation theory
Sort
View
PLDI
2009
ACM
14 years 2 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
KBSE
2005
IEEE
14 years 1 months ago
Automated test generation for engineering applications
In test generation based on model-checking, white-box test criteria are represented as trap conditions written in a temporal logic. A model checker is used to refute trap conditio...
Songtao Xia, Ben Di Vito, César Muño...
ATAL
2005
Springer
14 years 1 months ago
A multiagent system manages collaboration in emergent processes
Emergent processes are non-routine, collaborative business processes whose execution is guided by the knowledge that emerges during a process instance. In so far as the process go...
John K. Debenham
FUZZY
2004
Springer
170views Fuzzy Logic» more  FUZZY 2004»
14 years 1 months ago
Consistency Conditions for Fuzzy Choice Functions
The revealed preference is a central subject in classical consumer theory. Authors like Samuelson, Arrow, Richter, Sen, Uzawa and others have proposed an axiomatic setting of reve...
Irina Georgescu
GEOS
2009
Springer
14 years 8 days ago
Towards Reasoning Pragmatics
Abstract. The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenge...
Pascal Hitzler