We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 159 results
  1. Semantics and Syntax, Between Computer Science and Mathematics

    This text recounts my scientific itinerary from the late 1970s up to now, as I view it today, as well as the context in which it took place. The...
    Pierre-Louis Curien in The French School of Programming
    Chapter 2024
  2. Experimental Implementation of Web-Based Knowledge Base Verification Module

    The problem of knowledge bases verification is now recognized as an important problem in the knowledge engineering. In this article the selected...
    Roman Simiński, Agnieszka Nowak-Brzezińska, Michał Simiński in Computational Collective Intelligence
    Conference paper 2018
  3. The open agent society: retrospective and prospective views

    It is now more than ten years since the EU FET project ALFEBIITE finished, during which its researchers made original and distinctive contributions...

    Jeremy Pitt, Alexander Artikis in Artificial Intelligence and Law
    Article 01 September 2015
  4. Symmetries and Dualities in Name-Passing Process Calculi

    We study symmetries and duality between input and output in the $$\pi...
    Daniel Hirschkoff, Jean-Marie Madiot, Davide Sangiorgi in Computing with New Resources
    Chapter 2014
  5. What Do We Need to Know to Elect in Networks with Unknown Participants?

    A network with unknown participants is a communication network where the processes have very partial knowledge of the system. Nodes do not know the...
    Jérémie Chalopin, Emmanuel Godard, Antoine Naudin in Structural Information and Communication Complexity
    Conference paper 2014
  6. An Object Calculus with Remote Method Invocation

    Recently, object-oriented programming languages have been the fundamental infrastucture in software development. Several theoretical frameworks for...
    Shohei Matsumoto, Shin-ya Nishizaki in Theory and Practice of Computation
    Conference paper 2013
  7. Theorem of Three Circles in Coq

    The theorem of three circles in real algebraic geometry guarantees the termination and correctness of an algorithm of isolating real roots of a...

    Julianna Zsidó in Journal of Automated Reasoning
    Article 22 December 2013
  8. Basic Module Theory over Non-commutative Rings with Computational Aspects of Operator Algebras

    The present text surveys some relevant situations and results where basic Module Theory interacts with computational aspects of operator algebras. We...
    Conference paper 2014
  9. Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems

    This work focuses on testing the consistency of distributed and adaptable systems. In this context, Runtime Testing which is carried out on the final...
    Mariam Lahami, Moez Krichen, ... Mohamed Jmaiel in Testing Software and Systems
    Conference paper 2012
  10. Modeling and Solving

    This chapter presents the methodology of modeling and solving using NCL.
    Chapter 2012
  11. Abstract reduction in directed model checking CCS processes

    Model checking tools face a combinatorial blow up of the state-space (commonly known as the state explosion problem) that must be addressed to...

    Antonella Santone, Gigliola Vaglini in Acta Informatica
    Article 03 July 2012
  12. Comfort as a Multidimensional Preference Model for Energy Efficiency Control Issues

    The incessant need for energy has raised its cost to unexpected heights. In response to this situation, many projects have been started in order to...
    Afef Denguir, François Trousset, Jacky Montmain in Scalable Uncertainty Management
    Conference paper 2012
  13. Research for IT Driven Energy Efficiency Based on a Multidimensional Comfort Control*

    The incessant need for energy has raised its cost to unexpected heights. In response to this situation, many projects have been started in order to...
    Afef Denguir, François Trousset, Jacky Montmain in ICT as Key Technology against Global Warming
    Conference paper 2012
  14. Gridification of a Radiotherapy Dose Computation Application with the XtremWeb-CH Environment

    This paper presents the design and the evaluation of the gridification of a radiotherapy dose computation application. Due to the inherent...
    Nabil Abdennhader, Mohamed Ben Belgacem, ... Marc Sauget in Advances in Grid and Pervasive Computing
    Conference paper 2011
  15. Analytical Description of Digital Circles

    In this paper we propose an analytical description of different kinds of digital circles that appear in the literature and especially in digital...
    Eric Andres, Tristan Roussillon in Discrete Geometry for Computer Imagery
    Conference paper 2011
  16. Introduction to Digital Level Layers

    We introduce the notion of Digital Level Layer, namely the subsets of $\mathbb...
    Yan Gérard, Laurent Provot, Fabien Feschet in Discrete Geometry for Computer Imagery
    Conference paper 2011
  17. Nested Abstract Syntax in Coq

    We illustrate Nested Abstract Syntax as a high-level alternative representation of languages with binding constructs, based on nested datatypes. Our...

    André Hirschowitz, Marco Maggesi in Journal of Automated Reasoning
    Article 30 September 2010
  18. Minimalist Grammars in the Light of Logic

    In this paper, we aim at understanding the derivations of minimalist grammars without the shortest move constraint. This leads us to study the...
    Sylvain Salvati in Logic and Grammar
    Chapter 2011
  19. Linear Quantifier Elimination

    This paper presents verified quantifier elimination procedures for dense linear orders (two of them novel), for real and for integer linear...

    Article 02 July 2010
  20. SinFP, unification of active and passive operating system fingerprinting

    The ubiquity of firewalls using Network Address Translation and Port Address Translation ( NAT / PAT ), stateful inspection, and packet normalization...

    Patrice Auffret in Journal in Computer Virology
    Article 26 November 2008
Did you find what you were looking for? Share feedback.