Sciweavers

3513 search results - page 503 / 703
» Super Logic Programs
Sort
View
184
Voted
ICLP
2009
Springer
16 years 1 months ago
Incremental Answer Completion in the SLG-WAM
The SLG-WAM of XSB Prolog soundly implements the Well-Founded Semantics (WFS) for logic programs, but in a few pathological cases its engine treats atoms as undefined that are true...
Alexandre Miguel Pinto, Luís Moniz Pereira,...
87
Voted
ICFP
2005
ACM
16 years 22 days ago
A unified category-theoretic formulation of typed binding signatures
We generalise Fiore et al's account of variable binding for untyped cartesian contexts and Tanaka's account of variable binding for untyped linear contexts to give an ac...
Miki Tanaka, John Power
EUSFLAT
2009
122views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
Production and Transportation Planning - A fuzzy Approach for Minimizing the Total Cost
Abstract-- In this paper, we deal with the production and transportation planning of a household appliances manufacturer that has production facilities and central stores for resel...
Heinrich J. Rommelfanger
102
Voted
ICSE
2005
IEEE-ACM
16 years 26 days ago
Verifying safety policies with size properties and alias controls
Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typin...
Wei-Ngan Chin, Siau-Cheng Khoo, Shengchao Qin, Cor...
109
Voted
PLDI
2009
ACM
15 years 7 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni