Results 41 to 50 of about 29,886 (270)
The notion of computability closure has been introduced for proving the termination of the combination of higher-order rewriting and beta-reduction. It is also used for strengthening the higher-order recursive path ordering.
Blanqui, Frédéric
core +3 more sources
From Nonstandard Analysis to various flavours of Computability Theory
As suggested by the title, it has recently become clear that theorems of Nonstandard Analysis (NSA) give rise to theorems in computability theory (no longer involving NSA).
A Connes +11 more
core +1 more source
Computability of simple games: A characterization and application to the core [PDF]
The class of algorithmically computable simple games (i) includes the class of games that have finite carriers and (ii) is included in the class of games that have finite winning coalitions.
A Renzini +11 more
core +6 more sources
Verifying the structure and behavior in UML/OCL models using satisfiability solvers
Due to the ever increasing complexity of embedded and cyber-physical systems, corresponding design solutions relying on modelling languages such as Unified Modelling Language (UML)/Object Constraint Language (OCL) find increasing attention.
Nils Przigoda +4 more
doaj +1 more source
ABSTRACT Pediatric gastroenteropancreatic neuroendocrine neoplasms (GEP‐NENs) are extremely rare and clinically heterogeneous. Management has largely been extrapolated from adult practice. This European Standard Clinical Practice Guideline (ESCP), developed by the EXPeRT network in collaboration with adult NEN experts, provides (adult) evidence ...
Michaela Kuhlen +23 more
wiley +1 more source
The present article introduces ptarithmetic (short for "polynomial time arithmetic") -- a formal number theory similar to the well known Peano arithmetic, but based on the recently born computability logic (see http://www.cis.upenn.edu/~giorgi/cl.html ...
Japaridze, Giorgi
core +6 more sources
Computing-Model and Computing-Hardware Selection for ICT Under Societal and Judicial Constraints
This article discusses a formalization of aspects of Cyber-Sovereignty (CyS) for information and communication technology (ICT), linking them to technological trustworthiness and deriving an associated paradigm for hard- and software design. The upcoming
Yannik N. Bock +3 more
doaj +1 more source
Computing Solution Operators of Boundary-value Problems for Some Linear Hyperbolic Systems of PDEs [PDF]
We discuss possibilities of application of Numerical Analysis methods to proving computability, in the sense of the TTE approach, of solution operators of boundary-value problems for systems of PDEs.
Svetlana Selivanova, Victor Selivanov
doaj +1 more source
77 pages, figures included in the ps file. To appear in: Annual Reviews of Computational Physics, ed. Dietrich Stauffer, World Scientific, vol VI, 1998. The paper can be down loaded also from http://www.math.ias.edu/~doria/
openaire +3 more sources
ABSTRACT Background Neuropsychological complications may impair the qualitative prognosis of patients with pediatric brain tumors. However, multifaceted evaluations cannot be conducted in all patients because they are time consuming and burdensome for patients.
Ami Tabata +9 more
wiley +1 more source

