Results 61 to 70 of about 823,326 (291)

Definability of linear equation systems over groups and rings [PDF]

open access: yes, 2012
Motivated by the quest for a logic for PTIME and recent insights that the descriptive complexity of problems from linear algebra is a crucial aspect of this problem, we study the solvability of linear equation systems over finite groups and rings from ...
Anuj Dawar   +5 more
core   +6 more sources

A Knowledge‐Based Approach for Understanding and Managing Additive Manufacturing Data

open access: yesAdvanced Engineering Materials, EarlyView.
Additive manufacturing processes generate a large amount of data. Effectively managing, understanding, and retrieving information from this data remains a major challenge. Therefore, we propose an ontology‐based approach to integrate heterogeneous data, enable semantic queries, and support decision‐making.
Mina Abd Nikooie Pour   +5 more
wiley   +1 more source

The rôle of linear logic in coalgebraical approach of computing

open access: yesJournal of Information and Organizational Sciences, 2011
Linear logic provides a logical perspective on computational issues such as control of resources and order of evaluation. The most important feature of linear logic is that formulae areconsidered as actions.
Viliam Slodičák, Pavol Macko
doaj  

Deductive synthesis of recursive plans in linear logic [PDF]

open access: yes, 1999
Linear logic has previously been shown to be suitable for describing and deductively solving planning problems involving conjunction and disjunction.
A. Bundy   +15 more
core   +3 more sources

PASTA‐ELN: Simplifying Research Data Management for Experimental Materials Science

open access: yesAdvanced Engineering Materials, EarlyView.
Research data management faces ongoing hurdles as many ELNs remain complex and restrictive. PASTA‐ELN offers an open‐source, cross‐platform solution that prioritizes simplicity, offline access, and user control. Its in tuitive folder structure, modular Python add‐ons, and open formats enable seamless documentation, FAIR data practices, and easy ...
S. Brinckmann, G. Winkens, R. Schwaiger
wiley   +1 more source

Constructing Fully Complete Models of Multiplicative Linear Logic [PDF]

open access: yesLogical Methods in Computer Science, 2015
The multiplicative fragment of Linear Logic is the formal system in this family with the best understood proof theory, and the categorical models which best capture this theory are the fully complete ones. We demonstrate how the Hyland-Tan double glueing
Andrea Schalk, Hugh Paul Steele
doaj   +1 more source

Safety Constraint-Guided Reinforcement Learning with Linear Temporal Logic

open access: yesSystems, 2023
In the context of reinforcement learning (RL), ensuring both safety and performance is crucial, especially in real-world scenarios where mistakes can lead to severe consequences.
Ryeonggu Kwon, Gihwon Kwon
doaj   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

A m-ary linear feedback shift register with binary logic [PDF]

open access: yes, 1973
A family of m-ary linear feedback shift registers with binary logic is disclosed. Each m-ary linear feedback shift register with binary logic generates a binary representation of a nonbinary recurring sequence, producible with a m-ary linear feedback ...
Perlman, M.
core   +1 more source

A framework for proving the correctness of cryptographic protocol properties by linear temporal logic [PDF]

open access: yes, 2013
In this paper, a framework for cryptographic protocol analysis using linear temporal logic is proposed. The framework can be used to specify and analyse security protocols.
Abdullah Alabdulatif   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy