Sciweavers

1414 search results - page 140 / 283
» Combining Intruder Theories
Sort
View
94
Voted
FM
1999
Springer
97views Formal Methods» more  FM 1999»
15 years 5 months ago
Sensors and Actuators in TCOZ
Timed Communicating Object Z (TCOZ) combines Object-Z's strengths in modeling complex data and algorithms with Timed CSP's strengths in modeling real-time concurrency. TC...
Brendan P. Mahony, Jin Song Dong
90
Voted
AI
1998
Springer
15 years 5 months ago
Sequential Instance-Based Learning
This paper presents and evaluates sequential instance-based learning (SIBL), an approach to action selection based upon data gleaned from prior problem solving experiences. SIBL le...
Susan L. Epstein, Jenngang Shih
100
Voted
KBSE
1997
IEEE
15 years 5 months ago
Moving Proofs-As-Programs into Practice
Proofs in the Nuprl system, an implementation of a constructive type theory, yield “correct-by-construction” programs. In this paper a new methodology is presented for extract...
James L. Caldwell
BIRTHDAY
1997
Springer
15 years 5 months ago
Expressive Power of Unary Counters
We compare the expressive power on finite models of two extensions of first order logic L with equality. L(Ct) is formed by adding an operator count{x : ϕ}, which builds a term ...
Michael Benedikt, H. Jerome Keisler
CCL
1994
Springer
15 years 5 months ago
On Modularity in Term Rewriting and Narrowing
We introduce a modular property of equational proofs, called modularity of normalization, for the union of term rewrite systems with shared symbols. The idea is, that every normali...
Christian Prehofer