Results 41 to 50 of about 1,558,985 (350)

Symbolic execution proofs for higher order store programs [PDF]

open access: yes, 2014
Higher order store programs are programs which store, manipulate and invoke code at runtime. Important examples of higher order store programs include operating system kernels which dynamically load and unload kernel modules.
Charlton, Nathaniel   +2 more
core   +1 more source

Constructing the Lyapunov Function through Solving Positive Dimensional Polynomial System

open access: yesJournal of Applied Mathematics, 2013
We propose an approach for constructing Lyapunov function in quadratic form of a differential system. First, positive polynomial system is obtained via the local property of the Lyapunov function as well as its derivative.
Zhenyi Ji   +3 more
doaj   +1 more source

Premise Selection and External Provers for HOL4 [PDF]

open access: yes, 2015
Learning-assisted automated reasoning has recently gained popularity among the users of Isabelle/HOL, HOL Light, and Mizar. In this paper, we present an add-on to the HOL4 proof assistant and an adaptation of the HOLyHammer system that provides machine ...
Farmer W. M.   +7 more
core   +1 more source

Discrete Hierarchical Memory Particle Swarm Optimization Algorithm for Dynamic Public Transport [PDF]

open access: yesJisuanji gongcheng
With the development of smart cities and transport, the continuous improvement of mobile Internet and smart transport infrastructure and data, a new transport operation method in which users order transport services on their mobile phones-dynamic ...
HUANG Junze, WU Wenyuan, LI Yi, SHI Mingquan, WANG Zhengjiang
doaj   +1 more source

LPG-Based Knowledge Graphs: A Survey, a Proposal and Current Trends

open access: yesInformation, 2023
A significant part of the current research in the field of Artificial Intelligence is devoted to knowledge bases. New techniques and methodologies are emerging every day for the storage, maintenance and reasoning over knowledge bases.
Davide Di Pierro   +2 more
doaj   +1 more source

Further Thoughts on Defining f(x) for Ethical Machines: Ethics, Rational Choice, and Risk Analysis

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2023
There is a tendency to anthropomorphize artificial intelligence (AI) and reify it as a person. From the perspective of machine ethics and ethical AI, this has resulted in the belief that truly autonomous ethical agents (i.e., machines and algorithms) can
Clayton Peterson
doaj   +1 more source

The interaction of representation and reasoning [PDF]

open access: yes, 2013
Automated reasoning is an enabling technology for many applications of informatics. These applications include verifying that a computer program meets its specification; enabling a robot to form a plan to achieve a task and answering questions by ...
Ascoli G   +8 more
core   +1 more source

Automated Reasoning

open access: yes, 2006
Automated reasoning and knowledge representation are intertwined, as reasoning engines need to take into account representation formalisms and vice versa. The chapter entitled "Automated Reasoning" surveys both. It covers classical and non-classical logics, illustrating relevant trade-offs between expressivity and decidability.
M. BONACINA, MARTELLI, Alberto
openaire   +4 more sources

Constraint Solving for Finite Model Finding in SMT Solvers

open access: yes, 2017
SMT solvers have been used successfully as reasoning engines for automated verification and other applications based on automated reasoning. Current techniques for dealing with quantified formulas in SMT are generally incomplete, forcing SMT solvers to ...
Barrett, Clark   +2 more
core   +1 more source

The "never-proved" triangle inequality: A GeoGebra & CAS approach

open access: yesAIMS Mathematics, 2023
We use a quite simple, yet challenging, elementary geometry statement, the so-called "never proved" (by a mathematician) theorem, introduced by Prof.
Zoltán Kovács   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy