Sciweavers

1040 search results - page 94 / 208
» Resource Usage Verification
Sort
View
ATAL
2006
Springer
15 years 7 months ago
Prototyping 3APL in the Maude term rewriting language
Abstract. This paper presents an implementation of (a simplified version of) the cognitive agent programming language 3APL in the Maude term rewriting language. Maude is based on t...
M. Birna van Riemsdijk, Frank S. de Boer, Mehdi Da...
POPL
2004
ACM
16 years 3 months ago
Separation and information hiding
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resource...
Peter W. O'Hearn, Hongseok Yang, John C. Reynolds
ECAL
2005
Springer
15 years 8 months ago
Artificial Life Meets Anthropology: A Case of Aggression in Primitive Societies
One of the greatest challenges in the modern biological and social sciences has been to understand the evolution of altruistic and cooperative behaviors. General outlines of the an...
Mikhail S. Burtsev
ISCAS
2002
IEEE
92views Hardware» more  ISCAS 2002»
15 years 8 months ago
Low cost floating-point unit design for audio applications
This paper presents a low-cost, single-cycle floating-point unit developed for digital audio processing applications. In the unit, the serial steps of floating-point operations ar...
Sung-Won Lee, In-Cheol Park
CSCWD
2005
Springer
15 years 5 months ago
Process mining in CSCW systems
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst