نتایج جستجو برای: predicates it

تعداد نتایج: 2843026  

Journal: :Theory and Practice of Logic Programming 2007

Journal: :Bulletin of the Belgian Mathematical Society - Simon Stevin 2002

Journal: :Transactions of the American Mathematical Society 1955

Journal: :Electronic Notes in Theoretical Computer Science 2000

Journal: :Proceedings of the Annual Meetings on Phonology 2014

2010
J. R. SHOENFIELD

The object of hierarchy theory is to break down certain classes of predicates into subclasses of gradually increasing complexity. An excellent example is furnished by the hyperarithmetical hierarchy. Here each class in the hierarchy is obtained from the previous class by adding a single number quantifier. The Souslin-Kleene theorem [2, XXIV] then tells us that the predicates occurring in the hi...

Journal: :Logic, argumentation & reasoning 2023

The nature of moral judgments, and, more specifically, the question how they relate, on one hand, to objective reality other, subjective experience, are issues that have been central metaethics from its very beginnings. While these complex and challenging debated by analytic philosophers for over a century, it is only relatively recently interdisciplinary empirically-oriented approaches such be...

Journal: :Informatsionno-upravliaiushchie sistemy 2021

Introduction: We discuss the modern ways of developing intelligent problem solvers, focusing on their shortcomings in terms efficiency application for planning purposeful behavior autonomous mobile systems a priori undescribed conditions environment. Purpose: Developing model knowledge representation and processing which would provide to organize activity uncertain Methods: Synthesis frame-like...

2006
Mila Dalla Preda Matias Madou Koen De Bosschere Roberto Giacobazzi

Code obfuscation and software watermarking are well known techniques designed to prevent the illegal reuse of software. Code obfuscation prevents malicious reverse engineering, while software watermarking protects code from piracy. An interesting class of algorithms for code obfuscation and software watermarking relies on the insertion of opaque predicates. It turns out that attackers based on ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید