Sciweavers

2501 search results - page 169 / 501
» Logics with Rank Operators
Sort
View
LOPSTR
2001
Springer
15 years 9 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
CAV
1998
Springer
138views Hardware» more  CAV 1998»
15 years 8 months ago
Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs
bstract description of state machines (ASMs), in which data and data operations are d using abstract sort and uninterpreted function symbols. ASMs are suitable for describing Regis...
Ying Xu, Eduard Cerny, Xiaoyu Song, Francisco Core...
114
Voted
DAC
1994
ACM
15 years 8 months ago
Technology Mapping Using Fuzzy Logic
- This paper presents a placement-driven technology mapping procedure based on fuzzy delay curves. The fuzziness has been introduced to deal with the inherent vagueness in wiring l...
Sasan Iman, Massoud Pedram, Kamal Chaudhary
CCGRID
2006
IEEE
15 years 6 months ago
Integrating Logical and Physical File Models in the MPI-IO Implementation for "Clusterfile"
This paper presents the design and implementation of the MPI-IO interface for the Clusterfile parallel file system. The approach offers the opportunity of achieving a high corelat...
Florin Isaila, David E. Singh, Jesús Carret...
ECAI
2006
Springer
15 years 6 months ago
On the Logic of Theory Change: Relations Between Incision and Selection Functions
This work elaborates on the connection between partial meet contractions and kernel contractions in belief change theory. We present a way to define incision functions (used in ker...
Marcelo A. Falappa, Eduardo L. Fermé, Gabri...