Sciweavers

226 search results - page 24 / 46
» Extensional Theories and Rewriting
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
DAC
2006
ACM
14 years 9 months ago
DAG-aware AIG rewriting a fresh look at combinational logic synthesis
This paper presents a technique for preprocessing combinational logic before technology mapping. The technique is based on the representation of combinational logic using And-Inve...
Alan Mishchenko, Satrajit Chatterjee, Robert K. Br...
NORDICHI
2006
ACM
14 years 2 months ago
A new role for anthropology?: rewriting "context" and "analysis" in HCI research
In this paper we want to reconsider the role anthropology (both its theory and methods) can play within HCI research. One of the areas anthropologists can contribute to here is to...
Minna Räsänen, James M. Nyce
TLCA
2005
Springer
14 years 2 months ago
Semantic Cut Elimination in the Intuitionistic Sequent Calculus
Cut elimination is a central result of the proof theory. This paper proposes a new approach for proving the theorem for Gentzen’s intuitionistic sequent calculus LJ, that relies ...
Olivier Hermant
RTA
2009
Springer
14 years 3 months ago
An Explicit Framework for Interaction Nets
Abstract. Interaction nets are a graphical formalism inspired by Linear Logic proof-nets often used for studying higher order rewriting e.g. β-reduction. Traditional presentations...
Marc de Falco