Sciweavers

219 search results - page 43 / 44
» Towards Hilbertian Formal Methods
Sort
View
PLDI
2009
ACM
14 years 3 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
ICCS
2007
Springer
14 years 2 months ago
Quo Vadis, CS? - On the (non)-Impact of Conceptual Structures on the Semantic Web
Abstract. Conceptual Structures is a field of research which shares abstract concepts and interests with recent work on knowledge representation for the Semantic Web. However, whi...
Sebastian Rudolph, Markus Krötzsch, Pascal Hi...
ATAL
2005
Springer
14 years 2 months ago
Designing multiparty interaction support in Elva, an embodied tour guide
Although social research into group interaction has flourished since the 20th century, the technology of embodied conversational agents for handling multiparty interaction is stil...
Jun Zheng, Xiang Yuan, Yam San Chee
AFP
2004
Springer
105views Formal Methods» more  AFP 2004»
14 years 1 months ago
Epigram: Practical Programming with Dependent Types
Abstraction and application, tupling and projection: these provide the ‘software engineering’ superstructure for programs, and our familiar type systems ensure that these opera...
Conor McBride
IWCMC
2010
ACM
14 years 1 months ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy