Sciweavers

2084 search results - page 330 / 417
» Set Constraints in Logic Programming
Sort
View
PADL
2001
Springer
14 years 16 days ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
CHI
1998
ACM
14 years 10 days ago
Adapting User Interface Design Methods to the Design of Educational Activities
considered simply, but a more complex evaluation of the effects of performing the tasks. For example, an educational activity that learners complete quickly and accurately is of no...
Clayton Lewis, Cathy Brand, Gina Cherry, Cyndi Rad...
PPDP
2000
Springer
13 years 11 months ago
Enhanced sharing analysis techniques: a comprehensive evaluation
an abstract domain developed by D. Jacobs and A. Langen for the analysis of logic programs, derives useful aliasing information. It is well-known that a commonly used core of tech...
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill
DASFAA
2008
IEEE
137views Database» more  DASFAA 2008»
13 years 10 months ago
Efficient Mining of Recurrent Rules from a Sequence Database
We study a novel problem of mining significant recurrent rules from a sequence database. Recurrent rules have the form "whenever a series of precedent events occurs, eventuall...
David Lo, Siau-Cheng Khoo, Chao Liu 0001
CLIMA
2006
13 years 9 months ago
Adding Evolving Abilities to a Multi-Agent System
This paper reports on a fertile marriage between madAgents, a Java and Prolog based multi-agent platform, and EVOLP, a logic programming based language to represent and reason abou...
João Leite, Luís Soares