Sciweavers

1300 search results - page 148 / 260
» Probabilistic logic with independence
Sort
View
TPLP
2002
117views more  TPLP 2002»
13 years 8 months ago
On Properties of Update Sequences Based on Causal Rejection
In this paper, we consider an approach to update nonmonotonic knowledge bases represented as extended logic programs under the answer set semantics. In this approach, new informat...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 2 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
CMSB
2008
Springer
13 years 10 months ago
A Model Checking Approach to the Parameter Estimation of Biochemical Pathways
Model checking has historically been an important tool to verify models of a wide variety of systems. Typically a model has to exhibit certain properties to be classed `acceptable&...
Robin Donaldson, David Gilbert
WSC
2004
13 years 10 months ago
Visual Modeling of Business Problems: Workflow and Patterns
Computer-based business analysis relies on models, or algorithmic representations of the business process. Real-life business problems can become very complex, which creates diffi...
Lev Virine, Jason McVean
ICST
2009
IEEE
14 years 3 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry