Sciweavers

37 search results - page 7 / 8
» Toward a general theory of names: binding and scope
Sort
View
SAC
2010
ACM
14 years 1 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
CONTEXT
2001
Springer
13 years 10 months ago
Local Holism
Abstract. This paper is devoted to discuss a general tendency in contextualism which is known as "radical contextualism". In the first part I state the well known paradox...
Carlo Penco
QSIC
2008
IEEE
14 years 16 days ago
Fault Localization with Non-parametric Program Behavior Model
Fault localization is a major activity in software debugging. Many existing statistical fault localization techniques compare feature spectra of successful and failed runs. Some a...
Peifeng Hu, Zhenyu Zhang, Wing Kwong Chan, T. H. T...
LICS
2007
IEEE
14 years 12 days ago
A Complete Axiomatization of Knowledge and Cryptography
The combination of first-order epistemic logic and formal cryptography offers a potentially very powerful framework for security protocol verification. In this article, we addre...
Mika Cohen, Mads Dam
EMSOFT
2008
Springer
13 years 8 months ago
Disassembling real-time fault-tolerant programs
We focus on decomposition of hard-masking real-time faulttolerant programs (where safety, timing constraints, and liveness are preserved in the presence of faults) that are design...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Anish Ar...