Sciweavers

234 search results - page 21 / 47
» Deduction, Strategies, and Rewriting
Sort
View
ENTCS
2007
121views more  ENTCS 2007»
13 years 7 months ago
Rewrite-Based Decision Procedures
The rewrite-based approach to satisfiability modulo theories consists of using generic theorem-proving strategies for first-order logic with equality. If one can prove that an i...
Maria Paola Bonacina, Mnacho Echenim
JFLP
2002
101views more  JFLP 2002»
13 years 7 months ago
Complete Selection Functions for a Lazy Conditional Narrowing Calculus
In this paper we extend the lazy narrowing calculus lnc of Middeldorp, Okui, and Ida [26] to conditional rewrite systems. The resulting lazy conditional narrowing calculus lcnc is...
Aart Middeldorp, Taro Suzuki, Mohamed Hamada
ICALP
2010
Springer
13 years 5 months ago
Rewriting Measurement-Based Quantum Computations with Generalised Flow
Abstract. We present a method for verifying measurement-based quantum computations, by producing a quantum circuit equivalent to a given deterministic measurement pattern. We defin...
Ross Duncan, Simon Perdrix
IDEAS
2006
IEEE
98views Database» more  IDEAS 2006»
14 years 1 months ago
PAID: Mining Sequential Patterns by Passed Item Deduction in Large Databases
Sequential pattern mining is very important because it is the basis of many applications. Yet how to efficiently implement the mining is difficult due to the inherent characteri...
Zhenglu Yang, Masaru Kitsuregawa, Yitong Wang
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh