In this paper we show that the critical part of a correctness proof for implementations of higher-order functional languages is amenable to machine-assisted proof. An extended version of the lambda-calculus is conside...
详细信息
ISBN:
(纸本)3540600175
In this paper we show that the critical part of a correctness proof for implementations of higher-order functional languages is amenable to machine-assisted proof. An extended version of the lambda-calculus is considered, and the congruence between its direct and continuation semantics is proved. The proof has been constructed with the help of a generic theorem prover - Isabelle. The major part of the problem lies in establishing the existence of predicates which describe the congruence. This has been solved using Milne's inclusive predicate strategy [5]. The most important intermediate results and the main theorem as derived by Isabelle are quoted in the paper.
Humans always face problems when it comes to medical check-up due to lack of time or laziness. However, lots of medical problems and fatal illnesses can be detected at earlier stages if the person is subject to contin...
详细信息
We take a step forward towards invasive parallelization of sequential programs, where invasiveness amounts to weaving of parallel code into sequential cores on adaptable composition interfaces. In this paper we sugges...
详细信息
We determine the weakest failure detectors to solve several fundamental problems in distributed message-passing systems, for all environments - i.e., regardless of the number and timing of crashes. The problems that w...
详细信息
ISBN:
(纸本)9781581138023
We determine the weakest failure detectors to solve several fundamental problems in distributed message-passing systems, for all environments - i.e., regardless of the number and timing of crashes. The problems that we consider are: implementing an atomic register, solving consensus, solving quittable consensus (a variant of consensus in which processes have the option to decide 'quit' if a failure occurs), and solving non-blocking atomic commit.
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time ...
详细信息
ISBN:
(纸本)9780980326727
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time and the high cost in renting a fixed number of servers. We present its system architecture and describe its implementation in details. An experimental high-definition movie streaming site was setup using our content delivery grid system to demonstrate its capabilities with performance analysis.
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical *** a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this *** can result when the selection of features is subject to metaheuristics,which can lead to a wide range of ***,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more *** propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of *** the proposed method,the number of features selected is minimized,while classification accuracy is *** test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.
We introduce a generalization of the spreadsheet paradigm, called Knowledgesheet, for solving a class of constraint satisfaction problems. The traditional spreadsheet paradigm is based on attaching arithmetic expressi...
详细信息
GUI design isn't simply a matter of putting a nice front-end on a capable program. It requires thought about the way in which people might be expected to use a system, and investigation of the ways that they actua...
详细信息
GUI design isn't simply a matter of putting a nice front-end on a capable program. It requires thought about the way in which people might be expected to use a system, and investigation of the ways that they actually use it. Jape's GUI has been designed to be as simple as possible, so that it will not get in the way of the business of proof. It is designed to be minimal in the information that it displays and the gestures that it requires from the user. In this paper we introduce and give a rationale for the design of Jape's user interface, then note some of its drawbacks.
A case study on the simulation of a local area network (LAN) that has been used at Vrije Universiteit Brissel (VUB) and the University of Bern to illustrate evolution of object-oriented programs, is reported. The stud...
详细信息
A case study on the simulation of a local area network (LAN) that has been used at Vrije Universiteit Brissel (VUB) and the University of Bern to illustrate evolution of object-oriented programs, is reported. The study is intended to illustrate modeling support for software evolution. The case consists of an initial version of the simulation program and a series of changes in the specification that require it to evolve. The evolution of the program corresponds to a series of four consecutive requirements at the level of the LAN, which must be incorporated into the simulation program.
Throughout this paper,all groups are finite and G always denotes a finite group;σis some partition of the set of all primes P.A group G is said to beσ-primary if G is aπ-group for someπ∈σ.Aπ-semiprojector of G[...
详细信息
Throughout this paper,all groups are finite and G always denotes a finite group;σis some partition of the set of all primes P.A group G is said to beσ-primary if G is aπ-group for someπ∈σ.Aπ-semiprojector of G[29]is a subgroup H of G such that HN/N is a maximalπ-subgroup of G/N for all normal subgroups N of ***П⊆σ.Then we say thatχ={X_(1),...,X_(t)}is aП-covering subgroup system for a subgroup H in G if all members of the setχareσ-primary subgroups of G and for eachπ∈Пwithπ∩π(H)≠φthere are an index i and aπ-semiprojector U of H such that U≤X_(i).We study the embedding properties of subgroups H of G under the hypothesis that G has aП-covering subgroup systemχsuch that H permutes with X^(x)for all X∈χand x∈*** well-known results are generalized.
暂无评论