Sciweavers

122 search results - page 17 / 25
» Computing Properties of Numerical Imperative Programs by Sym...
Sort
View
LPKR
1997
Springer
15 years 3 months ago
Knowledge Representation with Logic Programs
In this overview we show how Knowledge Representation (KR) can be done with the help of generalized logic programs. We start by introducing the core of PROLOG, which is based on de...
Gerhard Brewka, Jürgen Dix
117
Voted
ESOP
2005
Springer
15 years 5 months ago
A New Foundation for Control-Dependence and Slicing for Modern Program Structures
The notion of control dependence underlies many program analysis and transformation techniques used in numerous applications. Despite wide application, existing definitions and ap...
Venkatesh Prasad Ranganath, Torben Amtoft, Anindya...
IPPS
1998
IEEE
15 years 3 months ago
Low Memory Cost Dynamic Scheduling of Large Coarse Grain Task Graphs
Schedulinglarge task graphsis an importantissue in parallel computingsince it allowsthe treatment of big size problems. In this paper we tackle the following problem: how to sched...
Michel Cosnard, Emmanuel Jeannot, Laurence Rougeot
100
Voted
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 5 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
ICALP
2005
Springer
15 years 5 months ago
Combining Intruder Theories
Abstract. Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples o...
Yannick Chevalier, Michaël Rusinowitch