Sciweavers

1342 search results - page 182 / 269
» Ordered Programs as Abductive Systems
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 7 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
IPPS
2007
IEEE
14 years 3 months ago
Analysis of a Computational Biology Simulation Technique on Emerging Processing Architectures
1 Multi-paradigm, multi-threaded and multi-core computing devices available today provide several orders of magnitude performance improvement over mainstream microprocessors. These...
Jeremy S. Meredith, Sadaf R. Alam, Jeffrey S. Vett...
ADAPTIVE
2007
Springer
14 years 3 months ago
Case-Based Recommendation
Abstract. Data Mining, or Knowledge Discovery as it is also known, is becoming increasingly useful in a wide variety of applications. In the following paper, we look at its use in ...
Barry Smyth
AIL
2004
113views more  AIL 2004»
13 years 8 months ago
On the Ontological Status of Plans and Norms
This article describes an ontological model of norms. The basic assumption is that a substantial part of a legal system is grounded on the concept of agency. Since a legal system a...
Guido Boella, Leonardo Lesmo, Rossana Damiano
POPL
2008
ACM
14 years 9 months ago
High-level small-step operational semantics for transactions
Software transactions have received significant attention as a way to simplify shared-memory concurrent programming, but insufficient focus has been given to the precise meaning o...
Katherine F. Moore, Dan Grossman