Sciweavers

1076 search results - page 80 / 216
» Operations on proofs and labels
Sort
View
CCS
2009
ACM
14 years 3 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...
EATCS
2000
85views more  EATCS 2000»
13 years 8 months ago
A New Zero-One Law and Strong Extension Axioms
One of the previous articles in this column was devoted to the zero-one laws for a number of logics playing prominent role in finite model theory: first-order logic FO, the extens...
Andreas Blass, Yuri Gurevich
CACM
2010
97views more  CACM 2010»
13 years 6 months ago
Certified software
Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The c...
Zhong Shao
ICPR
2004
IEEE
14 years 10 months ago
A Probabilistic Approach to Learning Costs for Graph Edit Distance
Graph edit distance provides an error-tolerant way to measure distances between attributed graphs. The effectiveness of edit distance based graph classification algorithms relies ...
Horst Bunke, Michel Neuhaus
APCCAS
2002
IEEE
92views Hardware» more  APCCAS 2002»
14 years 1 months ago
A cellular-automaton-type image extraction algorithm and its implementation using an FPGA
This paper proposes a new region extraction algorithm based on cellular automaton operation, which only utilizes the region boundary information of the image. A simple pixel circu...
Teppei Nakano, Takashi Morie, Makoto Nagata, Atsus...