Sciweavers

852 search results - page 44 / 171
» entcs 2010
Sort
View
ENTCS
2002
66views more  ENTCS 2002»
14 years 10 months ago
Unique, guarded fixed points in an additive setting: Extended Abstract
Abstract Stephen L. Bloom Department of Computer Science Stevens Institute of Technology Hoboken, NJ 07030 and Zolt
Stephen L. Bloom, Zoltán Ésik
ENTCS
2002
85views more  ENTCS 2002»
14 years 10 months ago
Dynamic Event Generation for Runtime Checking using the JDI
Approaches to runtime checking have to track the execution of a software system and therefore have to deal with generating and processing execution events. Often these techniques ...
Mark Brörkens, Michael Möller
ENTCS
1998
79views more  ENTCS 1998»
14 years 10 months ago
Covarieties and Complete Covarieties
We present two ways to de ne covarieties and complete covarieties, i.e. covarieties that are closed under total bisimulation: by closure operators and by subcoalgebras of coalgebr...
H. Peter Gumm, Tobias Schröder
ENTCS
2007
91views more  ENTCS 2007»
14 years 10 months ago
A Cappable Almost Everywhere Dominating Computably Enumerable Degree
We show that there exists an almost everywhere (a.e.) dominating computably enumerable (c.e.) degree which is half of a minimal pair.
George Barmpalias, Antonio Montalbán
ENTCS
2008
94views more  ENTCS 2008»
14 years 9 months ago
On the Convergence of Reduction-based and Model-based Methods in Proof Theory
In the recent past, the reduction-based and the model-based methods to prove cut elimination have converged, so that they now appear just as two sides of the same coin. This paper...
Gilles Dowek