Browsing by Subject "Logic programming"
Now showing items 1-4 of 4
-
A neural network algorithm for hardware-software verification
( IEEE , 2003 , Conference Paper)Formal verification is the task of proving that a property holds for a model of a design. This paper examines the idea of a Neural Network-based algorithm used to find the set of states that makes a specification valid. ... -
Compliance checking for usage-constrained credentials in trust negotiation systems
( Springer Berlin Heidelberg , 2012 , Conference Paper)We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ... -
Constraint-enhanced role engineering via answer set programming
( Association for Computing Machinery , 2012 , Conference Paper)Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ... -
Logic programs with ordered disjunction: First-order semantics and expressiveness
( AAAI Publications , 2014 , Conference Paper)Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ...