標(biāo)題: Titlebook: Logic-Based Program Synthesis and Transformation; 22nd International S Elvira Albert Conference proceedings 2013 Springer-Verlag Berlin Hei [打印本頁] 作者: 諷刺文章 時間: 2025-3-21 16:29
書目名稱Logic-Based Program Synthesis and Transformation影響因子(影響力)
書目名稱Logic-Based Program Synthesis and Transformation影響因子(影響力)學(xué)科排名
書目名稱Logic-Based Program Synthesis and Transformation網(wǎng)絡(luò)公開度
書目名稱Logic-Based Program Synthesis and Transformation網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Logic-Based Program Synthesis and Transformation被引頻次
書目名稱Logic-Based Program Synthesis and Transformation被引頻次學(xué)科排名
書目名稱Logic-Based Program Synthesis and Transformation年度引用
書目名稱Logic-Based Program Synthesis and Transformation年度引用學(xué)科排名
書目名稱Logic-Based Program Synthesis and Transformation讀者反饋
書目名稱Logic-Based Program Synthesis and Transformation讀者反饋學(xué)科排名
作者: SPASM 時間: 2025-3-21 22:56
An Introduction to Search Combinators,defining search heuristics is often inadequate. Either modeling capabilities are extremely limited or users are faced with a general-purpose programming language whose features are not tailored towards writing search heuristics. As a result, major improvements in performance may remain unexplored..T作者: 生氣的邊緣 時間: 2025-3-22 03:36 作者: alliance 時間: 2025-3-22 08:38
Semantic Code Clones in Logic Programs,or defining clones, we propose a more general approximation based on operational semantics and transformation rules. This new definition captures a wider set of clones, and allows to formally define the conditions under which a number of refactorings can be applied.作者: 變形 時間: 2025-3-22 09:24
Specialization with Constrained Generalization for Software Model Checking,ple imperative language, called SIMP, extended with a nondeterministic choice operator and we address the problem of checking whether or not a . property?. (that specifies that an . configuration cannot be reached) holds for a SIMP program?.. The operational semantics of the language?SIMP is specifi作者: Malaise 時間: 2025-3-22 16:20
Enhancing Declarative Debugging with Loop Expansion and Tree Compression,e debugger generates questions about the results obtained in different computations and the programmer only has to answer them to find the bug. Declarative debugging uses an internal representation of programs called execution tree, whose structure highly influences its performance. In this work we 作者: 描述 時間: 2025-3-22 20:50
XACML 3.0 in Answer Set Programming,unique answer set that directly corresponds to our formalisation of the standard semantics of XACML 3.0 from [9]. We demonstrate how our results make it possible to use off-the-shelf ASP solvers to formally verify properties of access control policies represented in XACML, such as checking the compl作者: PAN 時間: 2025-3-23 00:19
Types vs. PDGs in Information Flow Analysis,garding coverage of language features and security policies. In this article, we study the relationship between these two approaches. One key insight is that a type-based information flow analysis need not be less precise than a PDG-based analysis. For proving this result we establish a formal conne作者: Thymus 時間: 2025-3-23 02:24
Galliwasp: A Goal-Directed Answer Set Solver,nsible to full answer sets. . can execute arbitrary answer set programs in a top-down manner similar to SLD resolution. . generates candidate answer sets by executing . in a top-down, goal-directed manner using .. . next checks if the candidate answer sets are consistent with restrictions imposed by作者: 反抗者 時間: 2025-3-23 07:48
Computing More Specific Versions of Conditional Rewriting Systems,t of view. For instance, a rewrite system might have overlapping left-hand sides even if it can only produce at most one constructor normal form (i.e., value). In this paper, we propose a method for computing “more specific” versions of deterministic conditional rewrite systems (i.e., typical functi作者: 宮殿般 時間: 2025-3-23 10:42 作者: Electrolysis 時間: 2025-3-23 15:52 作者: Leisureliness 時間: 2025-3-23 18:41 作者: 完成才能戰(zhàn)勝 時間: 2025-3-23 22:48
Proving Properties of Co-logic Programs with Negation by Program Transformations,ogic programs, thereby allowing us to reason about infinite sequences of events such as behavior of reactive systems. The main problem with this approach is that only definite co-logic programs are considered, thus representing a rather narrow class of co-logic programs. In this paper we consider ”n作者: obsession 時間: 2025-3-24 06:25
,Program Analysis and Manipulation to Reproduce Learners’ Erroneous Reasoning,eous procedure they are following, and use the result of such deep cognitive diagnoses to repair its incorrect parts. We report a method for the automatic reconstruction of such erroneous procedures based on learner input and the analysis and manipulation of logic programs. The method relies on an i作者: Misgiving 時間: 2025-3-24 10:11 作者: 不妥協(xié) 時間: 2025-3-24 11:32 作者: Asperity 時間: 2025-3-24 15:07 作者: TIA742 時間: 2025-3-24 22:30 作者: 自制 時間: 2025-3-25 00:58
Céline Dandois,Wim Vanhoofprobabilistic models. The main contribution of these probabilistic model—building EAs resides in the fact that by learning a probabilistic model from selected solutions and subsequently drawing new solutions from the probability distribution represented by the probabilistic model, an inductive tool 作者: 逃避系列單詞 時間: 2025-3-25 03:46
Emanuele De Angelis,Fabio Fioravanti,Alberto Pettorossi,Maurizio Proiettihe lifetime of a chromosome is determined based on its survival and the reproduction capacities. Chromosomes of near-average quality are assigned a lifetime and inserted into a library called the chromosome library. Chromosomes in this library are combined with the current population in the creation作者: enhance 時間: 2025-3-25 10:18 作者: Brain-Waves 時間: 2025-3-25 11:41
Carroline Dewi Puspa Kencana Ramli,Hanne Riis Nielson,Flemming Nielsonh-tech enterprises and the problems they encounter.Outlook o.The ability to manage knowledge is relevant for millions of small and medium sized enterprises (SMEs) that operate in high-tech environments. They strongly depend on external knowledge about customers, technologies, and competitors because作者: FIG 時間: 2025-3-25 17:34
Heiko Mantel,Henning Sudbrockh-tech enterprises and the problems they encounter.Outlook o.The ability to manage knowledge is relevant for millions of small and medium sized enterprises (SMEs) that operate in high-tech environments. They strongly depend on external knowledge about customers, technologies, and competitors because作者: pulse-pressure 時間: 2025-3-25 20:17 作者: 容易生皺紋 時間: 2025-3-26 02:26
Naoki Nishida,Germán Vidalh-tech enterprises and the problems they encounter.Outlook o.The ability to manage knowledge is relevant for millions of small and medium sized enterprises (SMEs) that operate in high-tech environments. They strongly depend on external knowledge about customers, technologies, and competitors because作者: FER 時間: 2025-3-26 07:27
Minami Niwa,Naoki Nishida,Masahiko Sakaih-tech enterprises and the problems they encounter.Outlook o.The ability to manage knowledge is relevant for millions of small and medium sized enterprises (SMEs) that operate in high-tech environments. They strongly depend on external knowledge about customers, technologies, and competitors because作者: 濕潤 時間: 2025-3-26 09:49
José Miguel Rojas,Miguel Gómez-Zamalloah-tech enterprises and the problems they encounter.Outlook o.The ability to manage knowledge is relevant for millions of small and medium sized enterprises (SMEs) that operate in high-tech environments. They strongly depend on external knowledge about customers, technologies, and competitors because作者: Rct393 時間: 2025-3-26 13:50 作者: 使增至最大 時間: 2025-3-26 16:47 作者: 折磨 時間: 2025-3-27 00:12 作者: 打包 時間: 2025-3-27 04:14 作者: 江湖郎中 時間: 2025-3-27 08:59
978-3-642-38196-6Springer-Verlag Berlin Heidelberg 2013作者: liaison 時間: 2025-3-27 11:56
Logic-Based Program Synthesis and Transformation978-3-642-38197-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Adj異類的 時間: 2025-3-27 17:02 作者: monochromatic 時間: 2025-3-27 20:58 作者: FAZE 時間: 2025-3-28 01:41 作者: Tidious 時間: 2025-3-28 02:57 作者: 吸氣 時間: 2025-3-28 08:36
https://doi.org/10.1007/978-3-642-38197-3answer set programming; constraint logic programming; declarative debugging; security type system; softw作者: decode 時間: 2025-3-28 14:01 作者: 血友病 時間: 2025-3-28 14:53
Proving Properties of Co-logic Programs with Negation by Program Transformations,imination, when incorporated into the previous framework for unfold/fold transformation, allows us to represent and reason about a wider class of co-logic programs. We also discuss the difference between negation elimination applied to co-logic programs and the conventional negative unfolding applie作者: 贊成你 時間: 2025-3-28 19:39
an object property. (2) Four data integrity constraints: First Normal Form, Not Null, Unique and Primary Key. Another contribution of our proposal is related to the support for generating large ontologies, which are not usually supported by traditional tools of ontological engineering such as Protég作者: 整體 時間: 2025-3-29 00:07 作者: 談判 時間: 2025-3-29 06:36 作者: duplicate 時間: 2025-3-29 07:48
Henning Christiansen,Christian Theil Have,Ole Torp Lassen,Matthieu Petit search directions in the recombination of potentially promising solutions. Chromosome library is partially updated at the end of each generation and its size is limited by a maximum value. The proposed genetic algorithm strategy is applied to the solution of both stationary and nonstationary hard n作者: ECG769 時間: 2025-3-29 14:29
Céline Dandois,Wim Vanhoofn different types of induction. We review the literature on related work by discussing different classes of probability distribution that have been used so far in probabilistic model—building EAs. We conclude this chapter by reflecting on the use and applicability of learning probabilistic models fo作者: insipid 時間: 2025-3-29 19:33 作者: 波動 時間: 2025-3-29 20:07
David Insa,Josep Silva,César Tomásn different types of induction. We review the literature on related work by discussing different classes of probability distribution that have been used so far in probabilistic model—building EAs. We conclude this chapter by reflecting on the use and applicability of learning probabilistic models fo作者: 分散 時間: 2025-3-30 00:59 作者: Deference 時間: 2025-3-30 05:39
Heiko Mantel,Henning Sudbrockasis on the identification, acquisition and use of external knowledge. Drawing from this theoretical basis, the book presents concepts and instruments specifically designed for SMEs, as well as examples of their implementation and use in practice..978-3-7908-2525-1978-3-7908-1681-5作者: Firefly 時間: 2025-3-30 10:58
Kyle Marple,Gopal Guptaasis on the identification, acquisition and use of external knowledge. Drawing from this theoretical basis, the book presents concepts and instruments specifically designed for SMEs, as well as examples of their implementation and use in practice..978-3-7908-2525-1978-3-7908-1681-5