Sciweavers

1054 search results - page 3 / 211
» Guarded Expressions in Practice
Sort
View
CONCUR
2001
Springer
13 years 10 months ago
CCS with Priority Guards
It has long been recognised that standard process algebra has difficulty dealing with actions of different priority, such as for instance an interrupt action of high priority. Va...
Iain Phillips
DEXAW
2008
IEEE
93views Database» more  DEXAW 2008»
14 years 18 days ago
Overlay GHC: An Extension of Guarded Horn Clauses for Overlay Programming
Today’s high-speed network allows sophisticated applications of overlay networks. Meanwhile, usage of multicore processors has been spreading. The level of concurrency we need t...
Kenji Saito
POPL
2003
ACM
14 years 6 months ago
Guarded recursive datatype constructors
We introduce a notion of guarded recursive (g.r.) datatype constructors, generalizing the notion of recursive datatypes in functional programming languages such as ML and Haskell....
Hongwei Xi, Chiyan Chen, Gang Chen
LOPSTR
2007
Springer
14 years 8 days ago
Aggregates for CHR through Program Transformation
We propose an extension of Constraint Handling Rules (CHR) with aggregates such as sum, count, findall, and min. This new feature significantly improves the conciseness and expres...
Peter Van Weert, Jon Sneyers, Bart Demoen
HASE
1999
IEEE
13 years 10 months ago
Quantitative Evaluation of Dependability Critical Systems Based on Guarded Statechart Models
The paper introduces a method to model embedded dependability-critical systems as AND-composition of Guarded Statecharts which are special UMLstatecharts. With Guarded Statecharts...
Mario Dal Cin, Gábor Huszerl, Konstantinos ...