Sciweavers

1679 search results - page 7 / 336
» Security Properties and CSP
Sort
View
AAAI
2007
13 years 10 months ago
Inference Rules for High-Order Consistency in Weighted CSP
Recently defined resolution calculi for Max-SAT and signed Max-SAT have provided a logical characterization of the solving techniques applied by Max-SAT and WCSP solvers. In this...
Carlos Ansótegui, Maria Luisa Bonet, Jordi ...
IEEEARES
2008
IEEE
14 years 2 months ago
Modelling Security Properties in a Grid-based Operating System with Anti-Goals
In this paper, we discuss the use of formal requirementsengineering techniques in capturing security requirements for a Grid-based operating system. We use KAOS goal model to repr...
Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Bri...
ICASSP
2011
IEEE
12 years 11 months ago
Stationary Common Spatial Patterns: Towards robust classification of non-stationary EEG signals
Brain-Computer Interfaces (BCIs) allow a user to control a computer application by brain activity as acquired, e.g., by EEG. A standard step in a BCI system is to project the EEG ...
Wojciech Wojcikiewicz, Carmen Vidaurre, Motoaki Ka...
SAC
2006
ACM
14 years 1 months ago
Extending noninterference properties to the timed world
Most previous work on information flow in process algebras has been based on untimed models of concurrency. It is obvious, however, that an observer might well use time to gain i...
Jian Huang, A. W. Roscoe
ZUM
1998
Springer
111views Formal Methods» more  ZUM 1998»
13 years 12 months ago
Combining Specification Techniques for Processes, Data and Time
Abstract. We present a new combination CSP-OZ-DC of three well researched formal techniques for the specification of processes, data and time: CSP [17], Object-Z [36], and Duration...
Ernst-Rüdiger Olderog