Sciweavers

4595 search results - page 834 / 919
» Reasoning about Plans
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 8 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
FAC
2007
128views more  FAC 2007»
13 years 8 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
SIGOPS
2008
123views more  SIGOPS 2008»
13 years 8 months ago
The case for active block layer extensions
Self-managing storage systems have recently received attention from the research community due to their promised ability of continuously adapting to best reflect high-level system...
Jorge Guerra, Luis Useche, Medha Bhadkamkar, Ricar...
AEI
2004
114views more  AEI 2004»
13 years 8 months ago
Physical concept ontology for the knowledge intensive engineering framework
Knowledge intensive engineering aims at flexible applications of a variety of product life cycle knowledge, such as design, manufacturing, operations, maintenance, and recycling. ...
Masaharu Yoshioka, Yasushi Umeda, Hideaki Takeda, ...
AI
2000
Springer
13 years 8 months ago
EXPTIME tableaux for ALC
We show that global caching can be used with propagation of both satisfiability and unsatisfiability in a sound manner to give an EXPTIME algorithm for checking satisfiability w.r....
Francesco M. Donini, Fabio Massacci