Sciweavers

210 search results - page 11 / 42
» A Formal Theory of Key Conjuring
Sort
View
ISCI
2010
100views more  ISCI 2010»
13 years 5 months ago
Filters of residuated lattices and triangle algebras
An important concept in the theory of residuated lattices and other algebraic structures used for formal fuzzy logic, is that of a filter. Filters can be used, amongst others, to...
Bart Van Gasse, Glad Deschrijver, Chris Cornelis, ...
ECIS
2001
13 years 8 months ago
Barriers to effective knowledge management: Action Research Meets Grounded Theory
Despite evidence that the majority of knowledge management (KM) initiatives miscarry, there has been a paucity of critical, in-depth research into the causes of failure. In this p...
David Graham Wastell
ENTCS
2006
113views more  ENTCS 2006»
13 years 7 months ago
A Large-Scale Experiment in Executing Extracted Programs
It is a well-known fact that algorithms are often hidden inside mathematical proofs. If these proofs are formalized inside a proof assistant, then a mechanism called extraction ca...
Luís Cruz-Filipe, Pierre Letouzey
TYPES
1999
Springer
13 years 11 months ago
Information Retrieval in a Coq Proof Library Using Type Isomorphisms
We propose a method to search for a lemma in a goq proof library by using the lemma type as a key. The method is based on the concept of type isomorphism developed within the funct...
David Delahaye
TPHOL
2009
IEEE
14 years 2 months ago
Formalising Observer Theory for Environment-Sensitive Bisimulation
Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Jeremy E. Dawson, Alwen Tiu