Sciweavers

2291 search results - page 377 / 459
» Logic Programming and Model Checking
Sort
View
89
Voted
JMM2
2007
96views more  JMM2 2007»
15 years 2 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
119
Voted
CORR
2006
Springer
119views Education» more  CORR 2006»
15 years 2 months ago
Enhanced Prolog Remote Predicate Call Protocol
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC) [1]. The Prol...
Alin Suciu, Kalman Pusztai, Andrei Diaconu
TLCA
2009
Springer
15 years 8 months ago
Lexicographic Path Induction
Abstract. Programming languages theory is full of problems that reduce to proving the consistency of a logic, such as the normalization of typed lambda-calculi, the decidability of...
Jeffrey Sarnat, Carsten Schürmann
CAEPIA
2003
Springer
15 years 6 months ago
Embracing Causality in Inducing the Effects of Actions
Abstract. The following problem will be considered: from scattered examples on the behavior of a dynamic system induce a description of the system. For the induced description to b...
Ramón P. Otero
ESOP
2012
Springer
13 years 10 months ago
The Call-by-Need Lambda Calculus, Revisited
The existing call-by-need λ calculi describe lazy evaluation via equational logics. A programmer can use these logics to safely ascertain whether one term is behaviorally equivale...
Stephen Chang, Matthias Felleisen