Sciweavers

226 search results - page 24 / 46
» Extensional Theories and Rewriting
Sort
View
103
Voted
KBSE
2005
IEEE
15 years 6 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
96
Voted
DAC
2006
ACM
16 years 1 months ago
DAG-aware AIG rewriting a fresh look at combinational logic synthesis
This paper presents a technique for preprocessing combinational logic before technology mapping. The technique is based on the representation of combinational logic using And-Inve...
Alan Mishchenko, Satrajit Chatterjee, Robert K. Br...
NORDICHI
2006
ACM
15 years 6 months ago
A new role for anthropology?: rewriting "context" and "analysis" in HCI research
In this paper we want to reconsider the role anthropology (both its theory and methods) can play within HCI research. One of the areas anthropologists can contribute to here is to...
Minna Räsänen, James M. Nyce
103
Voted
TLCA
2005
Springer
15 years 6 months ago
Semantic Cut Elimination in the Intuitionistic Sequent Calculus
Cut elimination is a central result of the proof theory. This paper proposes a new approach for proving the theorem for Gentzen’s intuitionistic sequent calculus LJ, that relies ...
Olivier Hermant
110
Voted
RTA
2009
Springer
15 years 7 months ago
An Explicit Framework for Interaction Nets
Abstract. Interaction nets are a graphical formalism inspired by Linear Logic proof-nets often used for studying higher order rewriting e.g. β-reduction. Traditional presentations...
Marc de Falco