Sciweavers

1127 search results - page 72 / 226
» Theory Extension in ACL2(r)
Sort
View
82
Voted
IPPS
2007
IEEE
15 years 7 months ago
A Comparison of Dag-Scheduling Strategies for Internet-Based Computing
A fundamental challenge in Internet computing (IC) is to efficiently schedule computations having complex interjob dependencies, given the unpredictability of remote machines, in...
Robert Hall, Arnold L. Rosenberg, Arun Venkatarama...
FROCOS
2007
Springer
15 years 7 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
78
Voted
SAC
2005
ACM
15 years 6 months ago
An information retrieval model using the fuzzy proximity degree of term occurences
Based on the idea that the closer the query terms in a document are, the more relevant this document is, we propose a mathematical model of information retrieval based on a fuzzy ...
Michel Beigbeder, Annabelle Mercier
91
Voted
CAV
2005
Springer
104views Hardware» more  CAV 2005»
15 years 6 months ago
Expand, Enlarge and Check... Made Efficient
Abstract. The coverability problem is decidable for the class of wellstructured transition systems. Until recently, the only known algorithm to solve this problem was based on symb...
Gilles Geeraerts, Jean-François Raskin, Lau...
140
Voted
TLCA
2005
Springer
15 years 6 months ago
Call-by-Name and Call-by-Value as Token-Passing Interaction Nets
Two common misbeliefs about encodings of the λ-calculus in interaction nets (INs) are that they are good only for strategies that are not very well understood (e.g. optimal reduct...
François-Régis Sinot