نتایج جستجو برای: prime strong co

تعداد نتایج: 731423  

Journal: :Inf. Comput. 1999
Gilles Barthe

System F ! is an extension of system F ! with subtyping and bounded quantiication. Order-sorted algebra is an extension of many-sorted algebra with overloading and subtyping. We combine both formalisms to obtain IF ! , a higher-order typed-calculus with subtyping, bounded quan-tiication and order-sorted inductive types, i.e. data types with built-in subtyping and overloading. Moreover we show t...

1990
Thierry Coquand Jean Gallier

We give a proof that all terms that type-check in the theory of constructions are strongly normalizing (under-reduction). The main novelty of this proof is that it uses a \Kripke-like" interpretation of the types and kinds, and that it does not use innnite contexts. We explore some consequences of strong normalization, consistency and decidability of type-checking. We also show that our proof y...

2004
Peter Gordon

This talk will describe a set of studies examining numerical abilities in the Pirahã, a tribe living in lowland Amazonia in Brazil. Being one of the least integrated of the indigenous tribes in modern times, the Pirahã still live a basic hunter-gatherer existence with little or no contact with mainstream Brazilian culture. Their language contains no words that indicate exact numerosity with onl...

1998
Ashoke Sen

Many string theories contain states which are not BPS, but are stable due to charge conservation. In many cases the description of these states in the strong coupling limit remains unknown despite the existence of a weakly coupled dual theory. However, we show that in some cases duality symmetries in string theory do enable us to identify these states in the strong coupling limit and calculate ...

2012
MICHAEL KAPOVICH

Starting with Grothendieck’s proof of the local version of the Lefschetz hyperplane theorems [Gro68], it has been understood that there are strong parallels between the topology of smooth projective varieties and the topology of links of isolated singularities. This relationship was formulated as one of the guiding principles in the monograph [GM88, p. 26]: “Philosophically, any statement about...

Journal: :CoRR 2017
Ryu Hasegawa

We provide characterization of the strong termination property of the CCV λμ-calculus introduced in the first part of the series of the paper. The calculus is complete with respect to the standard CPS semantics. The union-intersection type systems for the calculus is developed in the previous paper. We characterize the strong normalizability of terms of the calculus in terms of the CPS semantic...

2004
R. F. Arenstorf

Here we will show that T (s)− B2(s − 1) −1 can be continuously extended onto the line Re s = 1, (Th.1). This enables application of the powerful complex Tauberian theorem of Wiener and Ikehara (1931) and then almost immediately yields our main result, (Th.2). The ideas basic to our proof of Th.1 are plain: We are striving to exhibit a relation between T (s) and the Riemann Zeta function ζ(s); m...

2001
H. van der Laan

We have used the Westerbork Northern Sky Survey (WENSS) to define a sample of 47 low redshift (z <∼ 0.4) giant radio galaxies. This is the largest sample yet of such radio sources originating from a single survey. We present radio maps of the newly discovered giants and optical images and spectra of their host galaxies. We present some of their properties and discuss the selection effects. We i...

2015
Chris Davis Jason A. Shaw Michael I. Proctor Donald Derrick Stacey Sherwood Jeesun Kim

The time to initiate naming a printed target word is reduced when preceded by an identical masked prime (match prime) or by one that has the same initial letter (onset prime) compared to an all letter different control. Masked priming has been examined using vocal response time but offers an opportunity to examine speech production dynamics before the onset of speech acoustics. We tracked tongu...

Journal: :J. Philosophical Logic 2013
Guido Governatori Francesco Olivieri Antonino Rotolo Simone Scannapieco

In this paper we propose an extension of Defeasible Logic to represent and compute three concepts of defeasible permission. In particular, we discuss different types of explicit permissive norms that work as exceptions to opposite obligations. Moreover, we show how strong permissions can be represented both with, and without introducing a new consequence relation for inferring conclusions from ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید