نتایج جستجو برای: analyzing these proofs
تعداد نتایج: 3169689 فیلتر نتایج به سال:
Logic programs augmented with delay declarations form a higly expressive programming language in which dynamic networks of processes that communicate asynchronously by means of multiparty channels can be easily created. In this paper we study correctness these programs. In particular, we propose proof methods allowing us to deal with occur check freedom, absence of deadlock, absence of errors i...
Recently, we developed an approach for automated termination proofs of Java Bytecode (JBC), which is based on constructing and analyzing termination graphs. These graphs represent all possible program executions in a finite way. In this paper, we show that this approach can also be used to detect non-termination or NullPointerExceptions. Our approach automatically generates witnesses, i.e., cal...
Logic programs augmented with delay declarations form a higly expressive programming language in which dynamic networks of processes that communicate asynchronously by means of multiparty channels can be easily created. In this paper we study correctness these programs. In particular, we propose proof methods allowing us to deal with occur check freedom, absence of deadlock, absence of errors i...
Linear Logic is gaining momentum in computer science because it ooers a uniied framework and a common vocabulary for studying and analyzing diierent aspects of programming and computation. We focus here on models where computation is identiied with proof search in the sequent system of Linear Logic. A proof normalization procedure, called \focusing", has been proposed to make the problem of pro...
Linear Logic is gaining momentum in computer science because it ooers a uniied framework and a common vocabulary for studying and analyzing diierent aspects of programming and computation. We focus here on models where computation is identiied with proof search in the sequent system of Linear Logic. A proof normalization procedure, called \focusing", has been proposed to make the problem of pro...
This paper is another case study in the program of logically analyzing proofs to extract new (typically effective) information (‘proof mining’). We extract explicit uniform rates of metastability (in the sense of T. Tao) from two ineffective proofs of a classical theorem of F.E. Browder on the convergence of approximants to fixed points of nonexpansive mappings as well as from a proof of a theo...
In this paper, some recent results established by Marin Borcut [M. Borcut, Tripled fixed point theorems for monotone mappings in partially ordered metric spaces, Carpathian J. Math. 28, 2 (2012), 207--214] and [M. Borcut, Tripled coincidence theorems for monotone mappings in partially ordered metric spaces, Creat. Math. Inform. 21, 2 (2012), 135--142] are generalized and improved, with much sho...
Verifiable security is an emerging approach in cryptography that advocates the use of principled tools for building machine-checked security proofs of cryptographic constructions. Existing tools following this approach, such as EasyCrypt or CryptoVerif, fall short of finding proofs automatically for many interesting constructions. In fact, devising automated methods for analyzing the security o...
study of validity of implications of proofs is among fundamental discussions in both usul al-fiqh and fiqh. authorized conjectural proofs (amarat) and practical principles can have indirect juristic implications as they have direct ones. investigation of validity of such indirect implications and effects is entitled investigation of validity of implications of proofs. some usulis hold that impl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید