Sciweavers

1776 search results - page 233 / 356
» Using a Logic Programming Language with Persistence and Cont...
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 9 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
LPNMR
2004
Springer
15 years 8 months ago
Probabilistic Reasoning With Answer Sets
This paper develops a declarative language, P-log, that combines logical and probabilistic arguments in its reasoning. Answer Set Prolog is used as the logical foundation, while c...
Chitta Baral, Michael Gelfond, J. Nelson Rushton
FUIN
2010
116views more  FUIN 2010»
15 years 16 days ago
An Investigation of Multi-Agent Planning in CLP
This paper explores the use of Constraint Logic Programming (CLP) as a platform for experimenting with planning problems in the presence of multiple interacting agents. The paper ...
Agostino Dovier, Andrea Formisano, Enrico Pontelli
LOBJET
2000
84views more  LOBJET 2000»
15 years 3 months ago
Typing Concurrent Objects and Actors
ABSTRACT. As informal methods do little to help their use for concurrent and distributed programming, one of the most challenging current tasks is to build tools based on formal me...
Fabien Dagnat, Marc Pantel, Matthias Colin, Patric...
POPL
2008
ACM
16 years 3 months ago
Imperative self-adjusting computation
Self-adjusting computation enables writing programs that can automatically and efficiently respond to changes to their data (e.g., inputs). The idea behind the approach is to stor...
Umut A. Acar, Amal Ahmed, Matthias Blume