Results 21 to 30 of about 1,008,187 (306)

Tarski's influence on computer science

open access: yes, 2006
The influence of Alfred Tarski on computer science was indirect but significant in a number of directions and was in certain respects fundamental. Here surveyed is the work of Tarski on the decision procedure for algebra and geometry, the method of ...
Prakash Panangaden, Solomon Feferman
core   +2 more sources

Logical consequences. Theory and applications: An introduction. [PDF]

open access: yes, 2020
2nd edition. The theory of logical consequence is central in modern logic and its applications. However, it is mostly dispersed in an abundance of often difficultly accessible papers, and rarely treated with applications in mind.
Augusto, Luis M.
core  

Higher-Order Termination: from Kruskal to Computability [PDF]

open access: yes, 2006
Termination is a major question in both logic and computer science. In logic, termination is at the heart of proof theory where it is usually called strong normalization (of cut elimination).
C. Borralleras   +13 more
core   +9 more sources

The Logic of Time: from Aristotle to Computer Science [PDF]

open access: yes, 2017
Charla tipo conferencia-seminario dada para alumnos de un másterThis short course will explore that continuous thread which connects the discussion about time in philosophy with the modern use of temporal logic in computer science. It will go through the
Bresolin, Davide
core  

Hypersequents and the Proof Theory of Intuitionistic Fuzzy Logic [PDF]

open access: yes, 2000
Takeuti and Titani have introduced and investigated a logic they called intuitionistic fuzzy logic. This logic is characterized as the first-order Goedel logic based on the truth value set [0,1].
Baaz, Matthias, Zach, Richard
core   +4 more sources

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Representation results for defeasible logic [PDF]

open access: yes, 2000
The importance of transformations and normal forms in logic programming, and generally in computer science, is well documented. This paper investigates transformations and normal forms in the context of Defeasible Logic, a simple but efficient formalism ...
Antoniou, G.   +3 more
core   +7 more sources

Intein‐based modular chimeric antigen receptor platform for specific CD19/CD20 co‐targeting

open access: yesMolecular Oncology, EarlyView.
CARtein is a modular CAR platform that uses split inteins to splice antigen‐recognition modules onto a universal signaling backbone, enabling precise, scarless assembly without re‐engineering signaling domains. Deployed here against CD19 and CD20 in B‐cell malignancies, the design supports flexible multi‐antigen targeting to boost T‐cell activation and
Pablo Gonzalez‐Garcia   +9 more
wiley   +1 more source

Completeness of Flat Coalgebraic Fixpoint Logics

open access: yes, 2010
Modal fixpoint logics traditionally play a central role in computer science, in particular in artificial intelligence and concurrency. The mu-calculus and its relatives are among the most expressive logics of this type.
Gastin, P.   +3 more
core   +1 more source

Preservation and decomposition theorems for bounded degree structures [PDF]

open access: yes, 2015
We provide elementary algorithms for two preservation theorems for first-order sentences (FO) on the class \^ad of all finite structures of degree at most d: For each FO-sentence that is preserved under extensions (homomorphisms) on \^ad, a \^ad ...
Harwath, Frederik   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy