In this paper we show that the Stone representation theorem for Boolean algebras can be generalized to combinatory algebras. In every combinatory algebra there is a Boolean algebr...
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
We propose to shift the goal of recognition from naming
to describing. Doing so allows us not only to name familiar
objects, but also: to report unusual aspects of a familiar
ob...
Ali Farhadi, David A. Forsyth, Derek Hoiem, Ian En...
Abstract. This paper indicates how effective software-process programming languages can lead to improved understandings of critical software processes, as well as improved process ...
Aaron G. Cass, Stanley M. Sutton Jr., Leon J. Oste...
This paper presents an iterative method for generative semantic clustering of related information elements in spatial hypertext documents. The goal is to automatically organize th...
Andruid Kerne, Eunyee Koh, Vikram Sundaram, J. Mic...