Sciweavers

2043 search results - page 336 / 409
» Reasoning About Security Models
Sort
View
POPL
2010
ACM
13 years 10 months ago
Nested interpolants
In this paper, we explore the potential of the theory of nested words for partial correctness proofs of recursive programs. Our conceptual contribution is a simple framework that ...
Matthias Heizmann, Jochen Hoenicke, Andreas Podels...
AAMAS
2007
Springer
13 years 10 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 10 months ago
Join Bayes Nets: A new type of Bayes net for relational data
Many real-world data are maintained in relational format, with different tables storing information about entities and their links or relationships. The structure (schema) of the ...
Oliver Schulte, Hassan Khosravi, Flavia Moser, Mar...
ENTCS
2008
175views more  ENTCS 2008»
13 years 10 months ago
AGAPIA v0.1: A Programming Language for Interactive Systems and Its Typing System
A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, programming a...
Cezara Dragoi, Gheorghe Stefanescu
IJIM
2008
60views more  IJIM 2008»
13 years 10 months ago
The Role of Podcasts in Students' Learning
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can ac...
Laurel Evelyn Dyson