Results 21 to 30 of about 1,741,164 (298)

A type reduction theory for systems with replicated components [PDF]

open access: yesLogical Methods in Computer Science, 2012
The Parameterised Model Checking Problem asks whether an implementation Impl(t) satisfies a specification Spec(t) for all instantiations of parameter t. In general, t can determine numerous entities: the number of processes used in a network, the type of
Tomasz Mazur, Gavin Lowe
doaj   +1 more source

Approximate reasoning for real-time probabilistic processes [PDF]

open access: yesLogical Methods in Computer Science, 2006
We develop a pseudo-metric analogue of bisimulation for generalized semi-Markov processes. The kernel of this pseudo-metric corresponds to bisimulation; thus we have extended bisimulation for continuous-time probabilistic processes to a much broader ...
Vineet Gupta   +2 more
doaj   +1 more source

Security Policies as Membranes in Systems for Global Computing [PDF]

open access: yesLogical Methods in Computer Science, 2005
We propose a simple global computing framework, whose main concern is code migration. Systems are structured in sites, and each site is divided into two parts: a computing body, and a membrane, which regulates the interactions between the computing body ...
Daniele Gorla   +2 more
doaj   +1 more source

OBTAINING Artemisia cina POLYPLOIDY THROUGH PLANT GROWTH REGULATOR TREATMENT IN SHOOT CULTURE

open access: yesAGRIVITA Journal of Agricultural Science, 2015
Artemisia cina is a medicinal plant species which produces bioactive compound potential to anti-tumor, antifungal and antibacterial medicines. This study was aimed to obtain A.
Maria Marina Herawati   +4 more
doaj   +1 more source

Linear Encodings of Bounded LTL Model Checking [PDF]

open access: yesLogical Methods in Computer Science, 2006
We consider the problem of bounded model checking (BMC) for linear temporal logic (LTL). We present several efficient encodings that have size linear in the bound.
Armin Biere   +4 more
doaj   +1 more source

Interaction of human heat shock protein 70 with tumor-associated peptides [PDF]

open access: yes, 2009
Molecular chaperones of the heat shock protein 70 (Hsp70) family play a crucial role in the presentation of exogenous antigenic peptides by antigen-presenting cells (APCs).
Bendz   +81 more
core   +1 more source

Bidirectional Runtime Enforcement of First-Order Branching-Time Properties [PDF]

open access: yesLogical Methods in Computer Science, 2023
Runtime enforcement is a dynamic analysis technique that instruments a monitor with a system in order to ensure its correctness as specified by some property.
Luca Aceto   +3 more
doaj   +1 more source

An Optical and Infrared Photometric Study of the Young Open Cluster IC 1805 in the Giant H II Region W4 [PDF]

open access: yes, 2017
We present deep wide-field optical CCD photometry and mid-infrared Spitzer/IRAC and MIPS 24micron data for about 100,000 stars in the young open cluster IC 1805.
Bessell, Michael S.   +9 more
core   +1 more source

Scalar and Vectorial mu-calculus with Atoms [PDF]

open access: yesLogical Methods in Computer Science, 2019
We study an extension of modal $\mu$-calculus to sets with atoms and we study its basic properties. Model checking is decidable on orbit-finite structures, and a correspondence to parity games holds. On the other hand, satisfiability becomes undecidable.
Bartek Klin, Mateusz Łełyk
doaj   +1 more source

B\"uchi Complementation and Size-Change Termination [PDF]

open access: yesLogical Methods in Computer Science, 2012
We compare tools for complementing nondeterministic B\"uchi automata with a recent termination-analysis algorithm. Complementation of B\"uchi automata is a key step in program verification.
Seth Fogarty, Moshe Y. Vardi
doaj   +1 more source

Home - About - Disclaimer - Privacy