As for the case with many other emerging industry, certain shortage of water causes mechanical devices to shut down. In addition to that, some instruments need a controlled water supply to run efficiently. On the othe...
详细信息
作者:
Bidoit, MichelHennicker, RolfLIENS
C.N.R.S. U.R.A. 1327 & Ecole Normale Supérieure 45 Rue d’Ulm Paris Cedex 05F-75230 France Institut für Informatik
Ludwig-Maximilians-Universität München Leopoldstr. 11B MünchenD-80802 Germany
Behavioural logic is a generalization of first-order logic where the equality predicate is interpreted by a behavioural equality of objects (and not by their identity). We establish simple and general sufficient condi...
详细信息
We illustrate the use of a declarative programming paradigm based upon three kinds of program clauses: equational, subset, and general relational clauses. the implemented language is called SURE, which is an acronym f...
详细信息
the proceedings contain 23 papers. the special focus in this conference is on programming. the topics include: About program termination and simplification;foreword;static type checking for languages with parametric t...
ISBN:
(纸本)9783540099819
the proceedings contain 23 papers. the special focus in this conference is on programming. the topics include: About program termination and simplification;foreword;static type checking for languages with parametric types and polymorphic procedures;a relational model for non-deterministic programs and predicate transformers;structures de controle et puissances d'expression;conception et optimisation des descentes recursives;an algebraic structure of petri nets;An algorithm for translating LISP programs into reduction language programs;concurrent operations in large ordered indexes;specification of highly parallel and distributed resource management;semantics for lisp without reference to an interpreter;Parallelism in ADA: Program design and meaning;the theory and practice of transforming call-by-need into call-by-value;concrete control phases in languages for programming complex systems;a model-theoretic approach to specification, extension, and implementation;Échappements et continuations en semantique dénotationnelle;suggestions for composing and specifying program design decisions;making programs more readable;types algebriques et semantique des langages de programmation;towards a theory of abstract data types: A discussion on problems and tools;on relations between programs.
this study presents a solution to the problem of automating the conversion of program code between different programming languages using artificial intelligence (AI) technologies this area is becoming increasingly rel...
详细信息
the proceedings contain 11 papers. the special focus in this conference is on Next Generation Arithmetic. the topics include: PLAUs: Posit Logarithmic Approximate Units to Implement Low-Cost Operations with ...
ISBN:
(纸本)9783031321795
the proceedings contain 11 papers. the special focus in this conference is on Next Generation Arithmetic. the topics include: PLAUs: Posit Logarithmic Approximate Units to Implement Low-Cost Operations with Real Numbers;bedot: Bit Efficient Dot Product for Deep Generative Models;a Paradigm for Interval-Aware programming;decoding-Free Two-Input Arithmetic for Low-Precision Real Numbers;Hybrid SORN Hardware Accelerator for Support Vector Machines;PHAc: Posit Hardware Accelerator for Efficient Arithmetic logic Operations;Fused three-Input SORN Arithmetic;towards a Better 16-Bit Number Representation for Training Neural Networks;improving the Stability of Kalman Filters with Posit Arithmetic.
the purpose of this paper is to describe a computational model for legal reasoning in criminal law (i.e. trial reasoning). this logic-programming based model contains seven key components: facts of a new case, old cas...
详细信息
Guarded Functional programming is an approach to integrate functional programming, represented by equations and rewriting, and logicprogramming, represented by Horn clauses and SLD-resolution: the selection of a guar...
详细信息
We are developing a shared-variable refinement calculus in the style of the sequential calculi of Back, Morgan, and Morris. As part of this work, we're studying different theories of shared-variable programming. U...
详细信息
ISBN:
(纸本)3540000291
We are developing a shared-variable refinement calculus in the style of the sequential calculi of Back, Morgan, and Morris. As part of this work, we're studying different theories of shared-variable programming. Using the concepts and notations of Hoare & He's unifying theories of programming (UTP), we give a formal semantics to a programming language that contains sequential composition, conditional statements, while loops, nested parallel composition, and shared variables. We first give a UTP semantics to labelled action systems, and then use this to give the semantics of our programs. Labelled action systems have a unique normal form that allows a simple formalisation and validation of different logics for reasoning about shared-variable programs. In this paper, we demonstrate how this is done for Lamport's Concurrent Hoare logic.
the proceedings contain 42 papers. the topics discussed include: collusion resistant fingerprinting of digital audio;using decision trees for generating adaptive SPIT signatures;cryptanalysis of the stream cipher BEAN...
ISBN:
(纸本)9781450310208
the proceedings contain 42 papers. the topics discussed include: collusion resistant fingerprinting of digital audio;using decision trees for generating adaptive SPIT signatures;cryptanalysis of the stream cipher BEAN;corporate networks security evaluation based on attack graphs;echo hiding based stereo audio watermarking against pitch-scaling attacks;algebraic analysis of GOST encryption algorithm;rational distance-bounding protocols over noisy channel;fault attack to the elliptic curve digital signature algorithm with multiple bit faults;trust based fusion over noisy channels through anomaly detection in cognitive radio networks;on automatic detection of SQL injection attacks by the feature extraction of the single character;security analysis of a femtocell device;logic based authorization program and its implementation;and detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol.
暂无评论