Sciweavers

2479 search results - page 51 / 496
» A Computational Theory of Working Memory
Sort
View
ENVSOFT
2002
82views more  ENVSOFT 2002»
13 years 7 months ago
Radiative perturbation theory: a review
Radiative perturbation theory is a computational technique which can greatly ease the burden of repeated solution of the radiative transfer equation for model atmospheres which di...
Michael A. Box
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
LION
2009
Springer
125views Optimization» more  LION 2009»
14 years 2 months ago
New Bounds on the Clique Number of Graphs Based on Spectral Hypergraph Theory
This work introduces new bounds on the clique number of graphs derived from a result due to S´os and Straus, which generalizes the Motzkin-Straus Theorem to a specific class of h...
Samuel Rota Bulò, Marcello Pelillo
FSTTCS
2004
Springer
14 years 1 months ago
Join Algorithms for the Theory of Uninterpreted Functions
The join of two sets of facts, E1 and E2, is defined as the set of all facts that are implied independently by both E1 and E2. Congruence closure is a widely used representation f...
Sumit Gulwani, Ashish Tiwari, George C. Necula
KR
1994
Springer
13 years 11 months ago
Modalities Over Actions, I. Model Theory
This paper analyzes a language for actions and the deontic modalities over actions -- i.e., the modalities permitted, forbidden and obligatory. The work is based on: (1) an action...
L. Thorne McCarty