Sciweavers

210 search results - page 11 / 42
» A Formal Theory of Key Conjuring
Sort
View
89
Voted
ISCI
2010
100views more  ISCI 2010»
15 years 9 days ago
Filters of residuated lattices and triangle algebras
An important concept in the theory of residuated lattices and other algebraic structures used for formal fuzzy logic, is that of a filter. Filters can be used, amongst others, to...
Bart Van Gasse, Glad Deschrijver, Chris Cornelis, ...
128
Voted
ECIS
2001
15 years 3 months ago
Barriers to effective knowledge management: Action Research Meets Grounded Theory
Despite evidence that the majority of knowledge management (KM) initiatives miscarry, there has been a paucity of critical, in-depth research into the causes of failure. In this p...
David Graham Wastell
155
Voted
ENTCS
2006
113views more  ENTCS 2006»
15 years 1 months ago
A Large-Scale Experiment in Executing Extracted Programs
It is a well-known fact that algorithms are often hidden inside mathematical proofs. If these proofs are formalized inside a proof assistant, then a mechanism called extraction ca...
Luís Cruz-Filipe, Pierre Letouzey
TYPES
1999
Springer
15 years 6 months ago
Information Retrieval in a Coq Proof Library Using Type Isomorphisms
We propose a method to search for a lemma in a goq proof library by using the lemma type as a key. The method is based on the concept of type isomorphism developed within the funct...
David Delahaye
TPHOL
2009
IEEE
15 years 8 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu