Search
Search Results
-
Semantics and Syntax, Between Computer Science and Mathematics
This text recounts my scientific itinerary from the late 1970s up to now, as I view it today, as well as the context in which it took place. The... -
Experimental Implementation of Web-Based Knowledge Base Verification Module
The problem of knowledge bases verification is now recognized as an important problem in the knowledge engineering. In this article the selected... -
The open agent society: retrospective and prospective views
It is now more than ten years since the EU FET project ALFEBIITE finished, during which its researchers made original and distinctive contributions...
-
Symmetries and Dualities in Name-Passing Process Calculi
We study symmetries and duality between input and output in the $$\pi... -
What Do We Need to Know to Elect in Networks with Unknown Participants?
A network with unknown participants is a communication network where the processes have very partial knowledge of the system. Nodes do not know the... -
An Object Calculus with Remote Method Invocation
Recently, object-oriented programming languages have been the fundamental infrastucture in software development. Several theoretical frameworks for... -
Theorem of Three Circles in Coq
The theorem of three circles in real algebraic geometry guarantees the termination and correctness of an algorithm of isolating real roots of a...
-
Basic Module Theory over Non-commutative Rings with Computational Aspects of Operator Algebras
The present text surveys some relevant situations and results where basic Module Theory interacts with computational aspects of operator algebras. We... -
Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems
This work focuses on testing the consistency of distributed and adaptable systems. In this context, Runtime Testing which is carried out on the final... -
Modeling and Solving
This chapter presents the methodology of modeling and solving using NCL. -
Abstract reduction in directed model checking CCS processes
Model checking tools face a combinatorial blow up of the state-space (commonly known as the state explosion problem) that must be addressed to...
-
Comfort as a Multidimensional Preference Model for Energy Efficiency Control Issues
The incessant need for energy has raised its cost to unexpected heights. In response to this situation, many projects have been started in order to... -
Research for IT Driven Energy Efficiency Based on a Multidimensional Comfort Control*
The incessant need for energy has raised its cost to unexpected heights. In response to this situation, many projects have been started in order to... -
Gridification of a Radiotherapy Dose Computation Application with the XtremWeb-CH Environment
This paper presents the design and the evaluation of the gridification of a radiotherapy dose computation application. Due to the inherent... -
Analytical Description of Digital Circles
In this paper we propose an analytical description of different kinds of digital circles that appear in the literature and especially in digital... -
Introduction to Digital Level Layers
We introduce the notion of Digital Level Layer, namely the subsets of $\mathbb... -
Nested Abstract Syntax in Coq
We illustrate Nested Abstract Syntax as a high-level alternative representation of languages with binding constructs, based on nested datatypes. Our...
-
Minimalist Grammars in the Light of Logic
In this paper, we aim at understanding the derivations of minimalist grammars without the shortest move constraint. This leads us to study the... -
Linear Quantifier Elimination
This paper presents verified quantifier elimination procedures for dense linear orders (two of them novel), for real and for integer linear...
-
SinFP, unification of active and passive operating system fingerprinting
The ubiquity of firewalls using Network Address Translation and Port Address Translation ( NAT / PAT ), stateful inspection, and packet normalization...