Sciweavers

1716 search results - page 99 / 344
» Proving Conditional Termination
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 6 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
14 years 9 months ago
Register Transfer Operation Analysis during Data Path Verification
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
D. Sarkar
CADE
2007
Springer
14 years 9 months ago
Optimized Reasoning in Description Logics Using Hypertableaux
We present a novel reasoning calculus for Description Logics (DLs)--knowledge representation formalisms with applications in areas such as the Semantic Web. In order to reduce the ...
Boris Motik, Rob Shearer, Ian Horrocks
PCI
2009
Springer
14 years 3 months ago
Investigation of Information Dissemination Design Criteria in Large-Scale Network Environments
—The design of efficient information dissemination mechanism is a challenging problem in large-scale network with respect to the number of messages and termination time. In this...
Konstantinos Oikonomou, Dimitrios Kogias, Leonidas...
PPDP
2009
Springer
14 years 3 months ago
An Isabelle/HOL-based model of stratego-like traversal strategies
Traversal strategies are at the heart of transformational programming with rewriting-based frameworks such as Stratego/XT or Tom and specific approaches for generic functional pr...
Markus Kaiser, Ralf Lämmel