Sciweavers

150 search results - page 13 / 30
» Counting Results in Weak Formalisms
Sort
View
IPL
2008
102views more  IPL 2008»
13 years 8 months ago
The connection between two ways of reasoning about partial functions
Undefined terms involving the application of partial functions and operators are common in program specifications and in discharging proof obligations that arise in design. One wa...
John S. Fitzgerald, Cliff B. Jones
ACTA
2011
13 years 3 months ago
Nonatomic dual bakery algorithm with bounded tokens
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave...
Alex A. Aravind, Wim H. Hesselink
SLOGICA
2010
138views more  SLOGICA 2010»
13 years 7 months ago
Extensionality and Restriction in Naive Set Theory
Abstract. The naive set theory problem is to begin with a full comprehension axiom, and to find a logic strong enough to prove theorems, but weak enough not to prove everything. T...
Zach Weber
IJVR
2007
128views more  IJVR 2007»
13 years 8 months ago
Occlusion Management in Immersive and Desktop 3D Virtual Environments: Theory and Evaluation
—We present an empirical usability experiment studying the relative strengths and weaknesses of three different occlusion management techniques for discovering and accessing obje...
Niklas Elmqvist, Mihail Eduard Tudoreanu
COLING
2010
13 years 3 months ago
A comparison of unsupervised methods for Part-of-Speech Tagging in Chinese
We conduct a series of Part-of-Speech (POS) Tagging experiments using Expectation Maximization (EM), Variational Bayes (VB) and Gibbs Sampling (GS) against the Chinese Penn Treeba...
Alex Cheng, Fei Xia, Jianfeng Gao