Sciweavers

1042 search results - page 107 / 209
» Failing First: An Update
Sort
View
ENTCS
2006
125views more  ENTCS 2006»
15 years 22 days ago
An Even Closer Integration of Linear Arithmetic into Inductive Theorem Proving
To broaden the scope of decision procedures for linear arithmetic, they have to be integrated into theorem provers. Successful approaches e.g. in NQTHM or ACL2 suggest a close int...
Tobias Schmidt-Samoa
JAL
2008
97views more  JAL 2008»
15 years 21 days ago
Experimental studies of variable selection strategies based on constraint weights
An important class of heuristics for constraint satisfaction problems works by sampling information during search in order to inform subsequent decisions. One of these strategies, ...
Richard J. Wallace, Diarmuid Grimes
JAR
2006
81views more  JAR 2006»
15 years 20 days ago
Verifying the SET Purchase Protocols
SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure ecommerce transactions. The Purcha...
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
78
Voted
JOLLI
2008
83views more  JOLLI 2008»
15 years 20 days ago
Inessential Features, Ineliminable Features, and Modal Logics for Model Theoretic Syntax
While monadic second-order logic (MSO) has played a prominent role in model theoretic syntax, modal logics have been used in this context since its inception. When comparing propos...
Hans-Jörg Tiede
95
Voted
JCP
2006
83views more  JCP 2006»
15 years 20 days ago
Concurrent Failures and Redundant Protection Problem in Hierarchical GMPLS Networks
The generalized multiprotocol label switching (GMPLS) networks attain a hierarchical structure, and each layer maintains an independent protection mechanism, resulting in redundant...
Sung-eok Jeon