Sciweavers

ENTCS
2006
117views more  ENTCS 2006»
13 years 11 months ago
Interpreting SWRL Rules in RDF Graphs
An unresolved issue in SWRL (the Semantic Web Rule Language) is whether the intended semantics of its RDF representation can be described as an extension of the W3C RDF semantics....
Jing Mei, Harold Boley
ENTCS
2006
131views more  ENTCS 2006»
13 years 11 months ago
Cooperating Theorem Provers: A Case Study Combining HOL-Light and CVC Lite
This paper is a case study in combining theorem provers. We define a derived rule in HOL-Light, CVC PROVE, which calls CVC Lite and translates the resulting proof object back to HO...
Sean McLaughlin, Clark Barrett, Yeting Ge
ENTCS
2006
137views more  ENTCS 2006»
13 years 11 months ago
An Efficient Method for Computing Exact State Space of Petri Nets With Stopwatches
In this paper, we address the issue of the formal verification of real-time systems in the context of a preemptive scheduling policy. We propose an algorithm which computes the st...
Morgan Magnin, Didier Lime, Olivier H. Roux
ENTCS
2006
125views more  ENTCS 2006»
13 years 11 months ago
On Timed Models and Full Abstraction
models and full abstraction Gavin Lowe and Jo
Gavin Lowe, Joël Ouaknine
ENTCS
2006
172views more  ENTCS 2006»
13 years 11 months ago
Locality of Queries and Transformations
Locality is a standard notion of finite model theory. There are two well known flavors of it, based on Hanf's and Gaifman's theorems. Essentially they say that structure...
Leonid Libkin
ENTCS
2006
125views more  ENTCS 2006»
13 years 11 months ago
Monads and Adjunctions for Global Exceptions
In this paper, we look at two categorical accounts of computational effects (strong monad as a model of the monadic metalanguage, adjunction as a model of call-bypush-value with s...
Paul Blain Levy
ENTCS
2006
183views more  ENTCS 2006»
13 years 11 months ago
Metamodel-Based Model Transformation with Aspect-Oriented Constraints
Model transformation means converting an input model available at the beginning of the transformation process to an output model. A widely used approach to model transformation us...
László Lengyel, Tihamer Levendovszky...
ENTCS
2006
145views more  ENTCS 2006»
13 years 11 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
ENTCS
2006
125views more  ENTCS 2006»
13 years 11 months ago
Hoare vs Milner: Comparing Synchronizations in a Graphical Framework With Mobility
We compare the expressive power of Hoare (i.e., CSP style) and Milner (i.e., CCS style) synchronizations for defining graph transformations in a framework where edges can perform ...
Ivan Lanese, Ugo Montanari
ENTCS
2006
172views more  ENTCS 2006»
13 years 11 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas