Search Results - Nonnumerical Algorithms AND Problems—complexity of proof procedure General Terms
-
1
Authors: et al.
Contributors: et al.
Subject Terms: I.2.3 [Artificial Intelligence, Deduction and Theorem Proving—deduction, I.1.2. [Algebraic Manipulation, Algorithms—analysis of algorithms, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—complexity of proof procedure General Terms, Algorithms, Theory, Language Additional Key Words and Phrases, Deduction, reasoning, satisfiabilty, implication, equivalence
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.17; http://www.cs.fiu.edu/~weiss/tods.pdf
-
2
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Algorithms, Theory Additional Key Words and Phrases, Proof complexity, parameterized complexity, Resolution, Prover-Delayer games ACM Reference Format
File Description: application/pdf
-
3
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors H.2.3 [Database management systems, Languages— query languages, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems— Complexity of proof procedures General Terms Algorithms, Theory Keywords XPath, trees, satisfiability
File Description: application/pdf
-
4
Authors: et al.
Contributors: et al.
Subject Terms: and Protection, D.4.6 [Operating Systems, Security and Protection—Access controls, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory, Languages Additional Key Words and Phrases, access control, trust management, distributed system security, logic
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4238; http://www.cs.utsa.edu/~winsboro/index_files/Papers/Safety_JACM_AcceptedVersion.pdf
-
5
Authors:
Contributors:
Source: http://arxiv.org/pdf/0805.1464v1.pdf.
Subject Terms: Categories and Subject Descriptors, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures, F.4.1 [Mathematical Logic and Formal Languages, Mathematical Logic—Proof theory, Mechanical theorem proving General Terms, Theory Additional Key Words and Phrases, Arithmetic, deduction modulo, higher-order logic, prooflength speed-ups, term
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.312.3589; http://arxiv.org/pdf/0805.1464v1.pdf
-
6
Authors:
Contributors:
Subject Terms: Mathematical Logic—Modal Logic, Computational Logic, F.2.2. [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of Proof Procedures General Terms, Algorithms, Languages, Theory Additional Key Words and Phrases, Shallow models, resolution, coalgebra
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.939; http://tocl.acm.org/accepted/352schroeder.pdf
-
7
Authors:
Contributors:
Subject Terms: Mathematical Logic—Modal Logic, Computational Logic, F.2.2. [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of Proof Procedures General Terms, Algorithms, Languages, Theory Additional Key Words and Phrases, Shallow models, resolution, coalgebra
File Description: application/pdf
-
8
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
File Description: application/pdf
-
9
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
10
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, F.4.1 [Mathematical Logic and Formal Languages, Mathematical Logic--computational logic, lambda calculus and related systems, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems-- complexity of proof procedures General Terms, Theory Additional Key Words and Phrases, elementary recursive functions, complexity, lambda calculus, second order logic
File Description: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.5408; http://www.tcs.ifi.lmu.de/~jjohanns/papers/elf.ps.gz
-
11
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
12
Authors:
Contributors:
Subject Terms: Nonnumerical Algorithms and Problems|complexity of proof procedures General terms, Algorithms, Theory Additional Key Words and Phrases, Data ow frameworks, data ow analysis, bidirectional data ows
File Description: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.3128; http://www.iitb.ernet.in:8000/~uday/t1271.ps
-
13
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Algorithms, Theory Additional Key Words and Phrases, Proof complexity, parameterized complexity, Resolution, bounded-depth Frege ACM Reference Format
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.4930; http://people.cs.uchicago.edu/~razborov/files/parres.pdf
-
14
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
File Description: application/pdf
-
15
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protec- tion, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory Additional Key Words and Phrases, Access control, fault-tolerant, policy design ACM Reference Format
File Description: application/pdf
-
16
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures, F.4.1 [Mathematical Logic and Formal Languages, Mathematical Logic—Modal logic General Terms, Algorithms, Theory Additional Key Words and Phrases, Parameterized Complexity, Satisfiability, Treewidth
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.3340; http://tocl.acm.org/accepted/praveen_treewidth.pdf
-
17
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: Categories and Subject Descriptors, D.3.4 [Programming Languages, Processors-- Compilers, Optimization, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems--complexity of proof procedures General terms, Algorithms, Theory Additional Key Words and Phrases, Data flow frameworks, data flow analysis, bidirectional data flows
File Description: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.4599; http://www.cse.iitb.ac.in/~dmd/genth.ps
-
18
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, I.2.4 [Knowledge Representation Formalisms and Methods, Representation languages, F.2.2. [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problem—Complexity of Proof Procedures, F.4.1 [Mathematical Logic and Formal Languages, Mathematical Logic—Computational Logic General Terms, Languages, Theory Additional Key Words and Phrases, description logics, Horn logic, computational complexity
File Description: application/pdf
-
19
Authors: et al.
Contributors: et al.
Source: http://knoesis.wright.edu/faculty/pascal/resources/publications/Hitzler-submission-HornDLs.pdf.
Subject Terms: Categories and Subject Descriptors, I.2.4 [Knowledge Representation Formalisms and Methods, Representation languages, F.2.2. [Analysis of Algorithms and Problem Com- plexity, Nonnumerical Algorithms and Problem—Complexity of Proof Procedures, F.4.1 [Math- ematical Logic and Formal Languages, Mathematical Logic—Computational Logic General Terms, Languages, Theory Additional Key Words and Phrases, description logics, Horn logic, computational complexity
File Description: application/pdf
-
20
Authors:
Contributors:
Subject Terms: Nonnumerical Algorithms and Problems—Complexity of proof procedures, F.4.1 [Mathematical Logic and Formal Languages, Mathematical Logic—Computational logic, Modal logic, Model theory, Proof theory General Terms, Access Control, Logic, Complexity Additional Key Words and Phrases, derivation problem, infon, infon logic, intuitionistic logic, linear time
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.192.5704; http://www.acm.org/pubs/tocl/accepted/446gurevich.pdf
Nájsť tento článok vo Web of Science