Sciweavers

1414 search results - page 86 / 283
» Combining Intruder Theories
Sort
View
APAL
2007
63views more  APAL 2007»
13 years 10 months ago
Bounded functional interpretation and feasible analysis
In this article we study applications of the bounded functional interpretation to theories of feasible arithmetic and analysis. The main results show that the novel interpretation...
Fernando Ferreira, Paulo Oliva
EAAI
2008
115views more  EAAI 2008»
13 years 10 months ago
Supply chain coordination: A game-theory approach
In a supply chain organized as a network of autonomous enterprises, the main objective of each partner is to optimize his production and supply policy with respect to his own econ...
Jean-Claude Hennet, Yasemin Arda
ENTCS
2008
99views more  ENTCS 2008»
13 years 10 months ago
ArcAngelC: a Refinement Tactic Language for Circus
Circus is a refinement language, in which specifications define both data and behavioural aspects of concurrent systems using a combination of Z and CSP. Its refinement theory and...
M. V. M. Oliveira, A. L. C. Cavalcanti
TRS
2008
13 years 10 months ago
A Model of User-Oriented Reduct Construction for Machine Learning
An implicit assumption of many machine learning algorithms is that all attributes are of the same importance. An algorithm typically selects attributes based solely on their statis...
Yiyu Yao, Yan Zhao, Jue Wang, Suqing Han
JSI
1998
125views more  JSI 1998»
13 years 9 months ago
The Algebraic Framework for Object-Oriented Systems
Abstract. Category Theory is introduced as the mathematical model for object-oriented systems which are distributed, heterogeneous, real-time, embedded, and open-ended. Each object...
D. H. H. Yoon