Sciweavers

1818 search results - page 292 / 364
» Operant conditioning
Sort
View
LICS
2010
IEEE
15 years 24 days ago
Weak Equivalences in Psi-Calculi
Psi-calculi extend the pi-calculus with nominal datatypes to represent data, communication channels, and logics for facts and conditions. This general framework admits highly expr...
Magnus Johansson, Jesper Bengtson, Joachim Parrow,...
142
Voted
LICS
2010
IEEE
15 years 24 days ago
Alternating Timed Automata over Bounded Time
Alternating timed automata are a powerful extension of classical Alur-Dill timed automata that are closed under all Boolean operations. They have played a key role, among others, ...
Mark Jenkins, Joël Ouaknine, Alexander Rabino...
MLQ
2010
226views more  MLQ 2010»
15 years 23 days ago
The Ultrafilter Closure in ZF
: It is well known that, in a topological space, the open sets can be characterized using filter convergence. In ZF (Zermelo-Fraenkel set theory without the Axiom of Choice), we c...
Gonçalo Gutierres
PERCOM
2010
ACM
15 years 23 days ago
Towards IEEE 802.15.4e: A study of performance aspects
—We discuss the applicability of IEEE 802.15.4 for application in industrial automation. Based on the specific requirements in this field, especially w.r.t. real-time operation...
Feng Chen, Reinhard German, Falko Dressler
SEKE
2010
Springer
15 years 22 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li