We show that every regular language, via some DFA which accepts it, gives rise to a homomorphism from the semiring of polynomial functors to the semiring of n×n matrices over poly...
In this paper we use a duality result between equations and coequations for automata, proved by Ballester-Bolinches, Cosme-Ll´opez, and Rutten to characterize nonempty classes of ...
Rely-Guarantee reasoning is a well-known method for verification of shared-variable concurrent programs. However, it is difficult for users to define rely/guarantee conditions, ...
The correspondence between up-closed multirelations and isotone predicate transformers is well known. Less known is that multirelations have also been used for modelling topologica...
Abstract. Bidirectional transformations (bx) support principled consistency maintenance among data sources. Each data source corresponds to one perspective on a composite system, m...
Faris Abou-Saleh, James Cheney, Jeremy Gibbons, Ja...
We discuss the variability in the performance of multiple runs of branch-and-cut Mixed Integer Linear Programming solvers, and we concentrate on the one deriving from the use of di...
Matteo Fischetti, Andrea Lodi, Michele Monaci, Dom...
The primal-dual column generation method (PDCGM) is a general-purpose column generation technique that relies on the primal-dual interior point method to solve the restricted mast...
In this paper, we explore completely regular codes in the Hamming graphs and related graphs. Experimental evidence suggests that many completely regular codes have the property th...
Jacobus H. Koolen, Woo-Sun Lee, William J. Martin,...
We present an effect system for algebraic effects and handlers. Because handlers may transform an effectful computation into a pure one, the effect system is non-monotone in the s...
We consider the relationships between algebra, geometry, computation, and proof. Computers have been used to verify geometrical facts by reducing them to algebraic computations. Bu...