Sciweavers

4257 search results - page 822 / 852
» The Logical Modularity of Programs
Sort
View
180
Voted
CORR
2004
Springer
177views Education» more  CORR 2004»
15 years 2 months ago
Typestate Checking and Regular Graph Constraints
We introduce regular graph constraints and explore their decidability properties. The motivation for regular graph constraints is 1) type checking of changing types of objects in ...
Viktor Kuncak, Martin C. Rinard
163
Voted
LOGCOM
1998
178views more  LOGCOM 1998»
15 years 2 months ago
Applying the Mu-Calculus in Planning and Reasoning about Action
Planning algorithms have traditionally been geared toward achievement goals in single-agent environments. Such algorithms essentially produce plans to reach one of a specified se...
Munindar P. Singh
122
Voted
MICS
2010
81views more  MICS 2010»
15 years 1 months ago
Tactics for Hierarchical Proof
Abstract. There is something of a discontinuity at the heart of popular tactical theorem provers. Low-level, fully-checked mechanical proofs are large trees consisting of primitive...
David Aspinall, Ewen Denney, Christoph Lüth
143
Voted
EUSFLAT
2009
196views Fuzzy Logic» more  EUSFLAT 2009»
15 years 15 days ago
Organizational Risk Assessment using Adaptive Neuro-Fuzzy Inference System
In this paper a fuzzy model based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is introduced for calculating the level of risk in managerial problems. In this model, affecting ...
Javad J. Jassbi, Sohrab Khanmohammadi
139
Voted
CLOUDCOM
2010
Springer
15 years 4 days ago
Semantics Centric Solutions for Application and Data Portability in Cloud Computing
Cloud computing has become one of the key considerations both in academia and industry. Cheap, seemingly unlimited computing resources that can be allocated almost instantaneously...
Ajith Ranabahu, Amit P. Sheth