Sciweavers

804 search results - page 89 / 161
» On the Termination of the Chase Algorithm
Sort
View
CCS
2008
ACM
15 years 2 months ago
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
We present a new verification algorithm for security protocols that allows for unbounded verification, falsification, and complete characterization. The algorithm provides a numbe...
Cas J. F. Cremers
CSL
2008
Springer
15 years 2 months ago
Syntactic Metatheory of Higher-Order Subtyping
Abstract. We present a new proof of decidability of higher-order subtyping in the presence of bounded quantification. The algorithm is formulated as a judgement which operates on b...
Andreas Abel, Dulma Rodriguez
99
Voted
ACL
2003
15 years 2 months ago
Counter-Training in Discovery of Semantic Patterns
This paper presents a method for unsupervised discovery of semantic patterns. Semantic patterns are useful for a variety of text understanding tasks, in particular for locating ev...
Roman Yangarber
IJCAI
1997
15 years 1 months ago
Equational Reasoning using AC Constraints
Unfailing completion is a commonly used technique for equational reasoning. For equational problems with associative and commutative functions, unfailing completion often generate...
David A. Plaisted, Yunshan Zhu
129
Voted
IWMMDBMS
1996
88views more  IWMMDBMS 1996»
15 years 1 months ago
Automating the Organization of Presentations for Playout Management in Multimedia Databases
We introduce a constraint-driven methodology for the automated assembly, organization and playout of presentations from multimedia databases. We use inclusion and exclusion constr...
Veli Hakkoymaz, Gultekin Özsoyoglu