Several methods to compute the prime implicants and the prime implicates of a negation normal form (NNF) formula are developed and implemented. An algorithm PI is introduced that is an extension to negation normal for...
详细信息
This collection of papers stems originally from a conference on Property Theory, Type Theory and Semantics held in Amherst on March 13-16 1986. The conference brought together logicians, philosophers, com puter ...
详细信息
ISBN:
(数字)9789400927230
ISBN:
(纸本)9781556080692;9781556080708
This collection of papers stems originally from a conference on Property Theory, Type Theory and Semantics held in Amherst on March 13-16 1986. The conference brought together logicians, philosophers, com puter scientists and linguists who had been working on these issues (of ten in isolation from one another). Our intent was to boost debate and exchange of ideas on these fundamental issues at a time of rapid change in semantics and cognitive science. The papers published in this work have evolved substantially since their original presentation at the conference. Given their scope, we thought it convenient to divide the work into two volumes. The first deals primarily with logical and philosophical foundations, the second with more empirical semantic issues. While there is a common set of issues tying the two volumes together, they are both self-contained and can be read independently of one another. Two of the papers in the present collection (van Benthem in volume 1 and Chierchia in volume II) were not actually read at the conference. They are nevertheless included here for their direct relevance to the topics of the volumes. Regrettably, some of the papers that were presented (Feferman, Klein, and Plotkin) could not be included in the present work due to timing problems. We nevertheless thank the authors for their contribu tion in terms of ideas and participation in the debate.
Big Data Management has become a critical task in many application systems, which usually rely on heavyweight batch processes to process large amounts of data. However, batch architectures are not an adequate choice f...
详细信息
In this paper we present the preliminary work of a Basque poetry generation system. Basically, we have extracted the POS-tag sequences from some verse corpora and calculated the probability of each sequence. For the g...
Speaker age is a speaker characteristic which is always present in speech. Previous studies have found numerous acoustic features which correlate with speaker age. However, few attempts have been made to establish the...
详细信息
Vigna and Ghezzi showed that the language of grid graphs could not be constructed by their context-free graph grammars [1]. In this paper, we construct a context-sensitive graph grammar for the two-dimensional grid gr...
详细信息
Ultra-dense networks (UDNs) are recognized as one of the key enabling technologies of the fifth generation (5G) networks, as they allow for an efficient spatial reuse of the spectrum, which is required to meet the tra...
详细信息
The Inspector/Executor is well-known for parallelizing loops with irregular access patterns that cannot be analyzed statically. The downsides of existing inspectors are that it is hard to amortize their high run-time ...
详细信息
programming with assertions constitutes an effective tool to detect and correct programming errors. The ability of executing formal specifications is essential in order to test automatically a program with respect to ...
详细信息
Mobile learning is considered the next step of online learning by incorporating mobility as a key requirement. Indeed, the current wide spread of mobile devices and wireless technologies brings an enormous potential t...
详细信息
暂无评论