Automated Generation of Geometric Theorems from Images of Diagrams [PDF]
We propose an approach to generate geometric theorems from electronic images of diagrams automatically. The approach makes use of techniques of Hough transform to recognize geometric objects and their labels and of numeric verification to mine basic ...
Chen, Xiaoyu, Song, Dan, Wang, Dongming
core +1 more source
Unbounded Viscosity Solutions of Hybrid Control Systems [PDF]
We study a hybrid control system in which both discrete and continuous controls are involved. The discrete controls act on the system at a given set interface.
Barles, Guy +2 more
core +5 more sources
Bell's Nonlocality Can be Detected by the Violation of Einstein-Podolsky-Rosen Steering Inequality [PDF]
Recently quantum nonlocality has been classified into three distinct types: quantum entanglement, Einstein-Podolsky-Rosen steering, and Bell's nonlocality. Among which, Bell's nonlocality is the strongest type.
Chen, Changbo +4 more
core +2 more sources
Convex Programs for Temporal Verification of Nonlinear Dynamical Systems [PDF]
A methodology for safety verification of continuous and hybrid systems using barrier certificates has been proposed recently. Conditions that must be satisfied by a barrier certificate can be formulated as a convex program, and the feasibility of the ...
Prajna, Stephen, Rantzer, Anders
core +1 more source
Formal Verification of Nonlinear Inequalities with Taylor Interval Approximations
We present a formal tool for verification of multivariate nonlinear inequalities. Our verification method is based on interval arithmetic with Taylor approximations.
A. Tarski +12 more
core +1 more source
A static cost analysis for a higher-order language [PDF]
We develop a static complexity analysis for a higher-order functional language with structural list recursion. The complexity of an expression is a pair consisting of a cost and a potential.
Danner, N., Paykin, J., Royer, J. S.
core +1 more source
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures [PDF]
Automated tools for finding attacks on flawed security protocols often fail to deal adequately with group protocols. This is because the abstractions made to improve performance on fixed 2 or 3 party protocols either preclude the modelling of group ...
Alan Bundy +16 more
core +3 more sources
The Role of Artificial Intelligence in Medication Management for Older Adults: A Systematic Review
Artificial intelligence enhances medication management for older adults by improving adherence, personalizing treatment, and predicting risks. Despite benefits, challenges remain in usability, trust, ethics, and system integration. Successful adoption requires user‐centered design, ethical safeguards, and seamless healthcare integration to ensure safe,
Dipak Chandra Das +9 more
wiley +1 more source
Polynomial Interpretations over the Natural, Rational and Real Numbers Revisited
Polynomial interpretations are a useful technique for proving termination of term rewrite systems. They come in various flavors: polynomial interpretations with real, rational and integer coefficients. As to their relationship with respect to termination
Middeldorp, Aart, Neurauter, Friedrich
core +1 more source
Proof Complexity of Propositional Default Logic [PDF]
Default logic is one of the most popular and successful formalisms for non-monotonic reasoning. In 2002, Bonatti and Olivetti introduced several sequent calculi for credulous and skeptical reasoning in propositional default logic.
Beyersdorff, O +4 more
core +3 more sources

