We present a spectrum of default logics, using powerdoma~ns to encode default constraints. the resulting non-monotonic entailment relations all satisfy the law of reasoning by cases. this result is a consequence of tw...
详细信息
In [3], McMillan described a technique for deadlock detection based on net unfoldings. We extend its applicability to the properties of a temporal logic with a possibility operator. the algorithm is based on Linear Pr...
详细信息
this book constitutes the refereed proceedings of the 4thinternational Joint conference on Automated Reasoning, IJCAR 2008, held in Sydney, Australia, in August 2008. the 26 revised full research papers and 13 revise...
详细信息
ISBN:
(数字)9783540710707
ISBN:
(纸本)9783540710691
this book constitutes the refereed proceedings of the 4thinternational Joint conference on Automated Reasoning, IJCAR 2008, held in Sydney, Australia, in August 2008. the 26 revised full research papers and 13 revised system descriptions presented together with 4 invited papers and a summary of the CASC-J4 systems competition were carefully reviewed and selected from 80 full paper and 17 system description submissions. the papers address the entire spectrum of research in automated reasoning and are organized in topical sections on specific theories, automated verification, protocol verification, system descriptions, modal logics, description logics, equational theories, theorem proving, CASC, the 4th IJCAR ATP system competition, logical frameworks, and tree automata.
the proceedings contain 30 papers. the topics discussed include: the state of hash functions and the NIST SHA-3 competition;key evolution systems in untrusted update environments;secure and privacy-preserving informat...
ISBN:
(纸本)9783642014390
the proceedings contain 30 papers. the topics discussed include: the state of hash functions and the NIST SHA-3 competition;key evolution systems in untrusted update environments;secure and privacy-preserving information brokering;provably secure convertible nominative signature scheme;cryptanalysis of two ring signcryption schemes;efficient signcryption key encapsulation without random oracles;security analysis of multivariate polynomials for hashing;SPVT-II: an efficient security protocol verifier based on logicprogramming;batch ZK proof and verification of OR logic;constructing variable-length PRPs and SPRPs from fixed-length PRPs;impossible differential analysis of reduced round CLEFIA;chosen ciphertext secure certificateless threshold encryption in the standard model;further observations on certificateless public key encryption;and efficient hardware architecture of SHA-256 algorithm for trusted mobile computing.
the vehicle routing problem(VRP) is an important issue in practical use. VRPs are one of combinatorial optimization problems. For solving such combinatorial problems, several evolutionary computation methods have been...
详细信息
ISBN:
(纸本)9781467369022
the vehicle routing problem(VRP) is an important issue in practical use. VRPs are one of combinatorial optimization problems. For solving such combinatorial problems, several evolutionary computation methods have been proposed. In practical situation, many complex constraint conditions and desired computation time are obstacles to use evolutionary computation methods to such problems. In this paper, an evolutionary computation based solver is developed. From some computational experiments for real tanker truck scheduling problem, effectiveness of the proposed method is shown.
this paper contributes to a line of research which aims to combine numerical information withlogical inference in order to find the most likely states of a biological system under various (actual or hypothetical) con...
详细信息
Extended clauses are the basic formulas of the 0-1 constraint solver used in the constraint logicprogramming language CLP(PB). We present a method for transforming an arbitrary linear 0-1 inequality into a set of ext...
详细信息
Observability and reachability are important concepts for formal software development. While observability concepts are used to specify the required observable behavior of a program or system, reachability concepts ar...
详细信息
Observability and reachability are important concepts for formal software development. While observability concepts are used to specify the required observable behavior of a program or system, reachability concepts are used to describe the underlying data in terms of datatype constructors. In this paper we first reconsider the observational logic institution which provides a logical framework for dealing with observability. then we develop in a completely analogous way the constructor-based logic institution which formalizes a novel treatment of reachability. Both institutions are tailored to capture the semantically correct realizations of a specification from either the observational or the reachability point of view. We show that there is a methodological and even formal duality between both frameworks. In particular, we establish a correspondence between observer operations and datatype constructors, observational and constructor-based algebras, fully abstract and reachable algebras, and observational and inductive consequences of specifications. the formal duality between the observability and reachability concepts is established in a category-theoretic setting. (C) 2002 Elsevier Science B.V. All rights reserved.
OWL web ontology language is an official W3C recommendation in ontology language that has recently been developed by the W3C. Although OWL has a powerful expressive ability on knowledge, it has no capability to repres...
详细信息
ISBN:
(纸本)0769528740
OWL web ontology language is an official W3C recommendation in ontology language that has recently been developed by the W3C. Although OWL has a powerful expressive ability on knowledge, it has no capability to represent the uncertainty and imprecise information. In the context of Semantic Web and multimedia applications, concepts are rather vague than precise and there are increasing needs to deal with vague knowledge. this paper proposes an extension of OWL DL with fuzzy logic by giving the formal syntax and semantics. the feature of the extension is that it has the ability, of capture the vague concepts withthe defined modifying operators.
the proceedings contain 16 papers. the special focus in this conference is on Declarative Agent Languages and Technologies. the topics include: Towards theory translation;the complexity of model checking concurrent pr...
ISBN:
(纸本)9783540689591
the proceedings contain 16 papers. the special focus in this conference is on Declarative Agent Languages and Technologies. the topics include: Towards theory translation;the complexity of model checking concurrent programs against CTLK specifications;dynamic model checking for multi-agent systems;automating belief revision for agentspeak;a foundational ontology of organizations and roles;when agents communicate hypotheses in critical situations;a fibred tableau calculus for modal logics of agents;programming declarative goals using plan patterns;JADL - an agent description language for smart agents;agreeing on defeasible commitments;a dynamic logicprogramming based system for agents with declarative goals;a collaborative framework to realize virtual enterprises using 3APL;a modeling framework for generic agent interaction protocols;plan generation and plan execution in agent programming;a functional program for agents, actions, and deontic specifications.
暂无评论