Sciweavers

461 search results - page 27 / 93
» Uniform Operators
Sort
View
IWFM
2000
112views Formal Methods» more  IWFM 2000»
14 years 11 months ago
A Note on the Relationships Between Logic Programs and Neural Networks
Several recent publications have exhibited relationships between the theories of logic programming and of neural networks. We consider a general approach to representing normal lo...
Pascal Hitzler, Anthony Karel Seda
OSDI
2000
ACM
14 years 11 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
SOSP
1989
ACM
14 years 11 months ago
RPC in the x-Kernel: Evaluating New Design Techniques
This paper reports our experiences implementing remote procedure call (RPC) protocols in the x-kernel. This exercise is interesting because the RPC protocols exploit two novel des...
Norman C. Hutchinson, Larry L. Peterson, Mark B. A...
GPEM
2000
103views more  GPEM 2000»
14 years 9 months ago
Size Fair and Homologous Tree Crossovers for Tree Genetic Programming
Abstract. Size fair and homologous crossover genetic operators for tree based genetic programming are described and tested. Both produce considerably reduced increases in program s...
William B. Langdon
TCS
2010
14 years 8 months ago
On the expressiveness of interaction
Subbisimilarity is proposed as a general tool to classify the relative expressive power of process calculi. The expressiveness of several variants of CCS is compared in terms of t...
Yuxi Fu, Hao Lu