Showing 181 - 200 results of 201 for search '"operational semantics"', query time: 0.24s Refine Results
  1. 181

    Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking by Le-tian SHA, Fu XIAO, Wei CHEN, Jing SUN, Ru-chuan WANG

    Published 2017-07-01
    “…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
    Get full text
    Article
  2. 182

    Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking by Le-tian SHA, Fu XIAO, Wei CHEN, Jing SUN, Ru-chuan WANG

    Published 2017-07-01
    “…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
    Get full text
    Article
  3. 183

    Constraint Generation for the Jeeves Privacy Language by Rose, Eva

    Published 2014
    “…We also present and implement the associated translation to J, but here formulated by a completed and decompositional operational semantic formulation. Finally, we present an enhanced and decompositional, non-substitutional operational semantic formulation and implementation of the J evaluation engine (the dynamic semantics) with privacy constraints. …”
    Get full text
  4. 184

    La estructura fonológica de la lengua china: introducción al estudio de los tonos by Taciana Fisac

    Published 1984-12-01
    “…These four tones produce alterations depending on the way they become combined, this operating semantic and syntactic differentiations. An essential matter refering to the Chinese speech, the tone acquires extraordinary importance within the poetical creation. …”
    Get full text
    Article
  5. 185

    Austere Realism: Contextual Semantics Meets Minimal Ontology, by Terence Horgan and Matjaž Potrč by Khoo, Justin Donald

    Published 2018
    “…On the language side, they argue for a semantic theory (contextual semantics) according to which the truth of a statement or thought just is its being semantically correct under contextually operative semantic standards. Their semantic thesis allows H&P to avoid the following inconsistent duo: (M) There are mountains in North America. …”
    Get full text
    Get full text
    Article
  6. 186

    From Fact Drafts to Operational Systems: Semantic Search in Legal Decisions Using Fact Drafts by Gergely Márk Csányi, Dorina Lakatos, István Üveges, Andrea Megyeri , János Pál Vadász, Dániel Nagy, Renátó Vági

    Published 2024-12-01
    “…These insights led to an operational semantic search system for a prominent legal content provider.…”
    Get full text
    Article
  7. 187

    Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO

    Published 2018-02-01
    “…Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.,integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control,sticky policies and inconsistent operation semantics.To satisfy these requirements,cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all,the process of mapping was illustrated using the example of space-ground integrated networks.Next,a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.…”
    Get full text
    Article
  8. 188

    Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO

    Published 2018-02-01
    “…Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.,integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control,sticky policies and inconsistent operation semantics.To satisfy these requirements,cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all,the process of mapping was illustrated using the example of space-ground integrated networks.Next,a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.…”
    Get full text
    Article
  9. 189

    Research on verification of behavior requirement patterns based on action sequences by DU Jun-wei1, XU Zhong-wei2, JIANG Feng1

    Published 2011-01-01
    “…Function behavior requirements(FBR) and safety behavior requirements(SBR) were described by action se-quences.Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS’s safety and liveness.The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Compo-nent-based safety-critical systems.…”
    Get full text
    Article
  10. 190

    Research on verification of behavior requirement patterns based on action sequences by DU Jun-wei1, XU Zhong-wei2, JIANG Feng1

    Published 2011-01-01
    “…Function behavior requirements(FBR) and safety behavior requirements(SBR) were described by action se-quences.Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS’s safety and liveness.The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Compo-nent-based safety-critical systems.…”
    Get full text
    Article
  11. 191

    A mathematical game semantics of concurrency and nondeterminism by Gutierrez, J

    Published 2015
    “…However, such a closure operator semantics has not been investigated in the more general nondeterministic case. …”
    Conference item
  12. 192

    Security analysis of security protocol Swift implementations based on computational model by Bo MENG, Xudong HE, Jinli ZHANG, Lili YAO, Jintian LU

    Published 2018-09-01
    “…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
    Get full text
    Article
  13. 193

    From Affective Science to Psychiatric Disorder: Ontology as a Semantic Bridge by Rasmus Rosenberg Larsen, Janna Hastings

    Published 2018-10-01
    “…This effort further draws on developments in formal ontology regarding the distinction between normal and abnormal in order to formalize the interconnections. This operational semantic framework is relevant for applications including clarifying psychiatric diagnostic categories, clinical information systems, and the integration and translation of research results across disciplines.…”
    Get full text
    Article
  14. 194

    Security analysis of security protocol Swift implementations based on computational model by Bo MENG, Xudong HE, Jinli ZHANG, Lili YAO, Jintian LU

    Published 2018-09-01
    “…Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.…”
    Get full text
    Article
  15. 195

    A formal analysis method for composition protocol based on model checking by Meihua Xiao, Hanyu Zhao, Ke Yang, Ri Ouyang, Weiwei Song

    Published 2022-05-01
    “…To solve this problem, firstly, a formal analysis method for composition protocol based on SPIN is proposed, and a formal description of protocol operation semantics is given. Then the attacker model is formalized, and a message specification method based on field detection and component recognition is presented to alleviate the state explosion problem. …”
    Get full text
    Article
  16. 196

    Resolving Distributed Knowledge by Thomas Ågotnes, Yì N. Wáng

    Published 2016-06-01
    “…The R_G operators are called resolution operators. Semantically, we say that an expression R_Gφ is true iff φ is true in what van Benthem [11, p. 249] calls (G's) communication core; the model update obtained by removing links to states for members of G that are not linked by all members of G. …”
    Get full text
    Article
  17. 197

    Segmentation of Drilled Holes in Texture Wooden Furniture Panels Using Deep Neural Network by Rytis Augustauskas, Arūnas Lipnickas, Tadas Surgailis

    Published 2021-05-01
    “…We show that even a lightweight architecture is capable to perform on a range of complex textures and is able to distinguish the holes drilling operations’ semantical information from the rest of the furniture board and conveyor context. …”
    Get full text
    Article
  18. 198

    Partial-order Boolean games: informational independence in a logic-based model of strategic interaction by Bradfield, J, Gutierrez, J, Wooldridge, M

    Published 2015
    “…We also show that the concurrency in partial-order Boolean games can be modelled using a closure-operator semantics, and conclude by considering the relationship of our model to Independence-Friendly (IF) logic.…”
    Journal article
  19. 199

    Study on Path Planning in Cotton Fields Based on Prior Navigation Information by Meng Wang, Changhe Niu, Zifan Wang, Yongxin Jiang, Jianming Jian, Xiuying Tang

    Published 2024-11-01
    “…Considering the dual attributes of walking and the operation of agricultural machinery, four kinds of operation semantic points were embedded into the path. Finally, path generation software was designed. …”
    Get full text
    Article
  20. 200

    TRANSFORMASI CHANNEL SYSTEM KE LABELLED TRANSITION SYSTEM by , SITI MUTMAINAH, , Dr. Ing. Mhd Reza M.I Pulungan, S.Si., M.Sc.

    Published 2012
    “…Through the concept of parallelism, the algorithm is run by exploiting the so-called SOS (Structured Operational Semantic) approach. Transformation algorithm is implemented by developing a prototype tool designed with 3 essential components, input, process and output. …”
    Thesis