Duodenitis 发表于 2025-3-25 05:19:20

Tripta Jhang,Shweta Dwivedi,Sarika Sharma: We reduce the model checking problem to the problem of computing certain Parikh vectors, and we show that for the class of safe marked graphs these vectors can be computed — from the structure of the Petri net — in polynomial time in the size of the system.

狗窝 发表于 2025-3-25 11:08:39

http://reply.papertrans.cn/24/2338/233778/233778_22.png

有斑点 发表于 2025-3-25 14:33:38

The Catholic Church and Unruly Women Writersterleaving universal quantifiers and TC-operators..It is also shown that transitive closure logic (and its fragments) have the same expressive power as the linear programs in certain extensions of Datalog.

挑剔小责 发表于 2025-3-25 18:04:55

http://reply.papertrans.cn/24/2338/233778/233778_24.png

难听的声音 发表于 2025-3-25 20:24:31

The cutting plane proof system with bounded degree of falsity,d show the results: This system .-simulates resolution and has polynomial size proofs for the pigeonhole formulas. The formulas from [ 9] only have superpolynomially long proofs in the system. Our system is the only known system with provably superpolynomial proof size, but polynomial size proofs for the pigeonhole formulas.

Mawkish 发表于 2025-3-26 03:02:27

http://reply.papertrans.cn/24/2338/233778/233778_26.png

Phenothiazines 发表于 2025-3-26 07:33:39

Conference proceedings 1992is was the fifth in aseries of annual workshops on computer sciencelogic (thefirst four are recorded in LNCS volumes 329, 385, 440, and533).The volume contains 33 invited and selected papers on avariety of logical topics in computer science, includingabstract datatypes, bounded theories, complexity

Rankle 发表于 2025-3-26 12:26:56

A new approach to abstract data types II computation on ADTs as ordinary computation,own that each such procedure is preserved under isomorphism and thus determines an abstract procedure over ADTs. The main new feature of the g.r.t. developed here is that abstract computational procedures reduce to computational procedures in the ordinary sense when confined to data structures in a recursion-theoretic interpretation.

值得尊敬 发表于 2025-3-26 15:29:55

http://reply.papertrans.cn/24/2338/233778/233778_29.png

幼儿 发表于 2025-3-26 18:57:05

A transformational methodology for proving termination of logic programs,e Ullman and van Gelder‘s approach and Plümer‘s method, no preprocessing is needed, and the approach works well even in the presence of mutual recursion. This approach has been used recently to show termination of the Prolog implementation of compiler for ProCoS level 0 language PL. developed at Oxford University.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Computer Science Logic; 5th Workshop, CSL ‘9 Egon Börger,Gerhard Jäger,Michael M. Richter Conference proceedings 1992 Springer-Verlag Berli