نتایج جستجو برای: gramming
تعداد نتایج: 158 فیلتر نتایج به سال:
gramming and distribution which, when combined with novel uses of intellectual property law, has come to be known as “free software” or “open source software.” It is distinguished from other forms and practices of software production for many reasons, but most interestingly because its practitioners discuss it not simply in technical terms, but as a philosophy, a politics, a critique, a social ...
Independence-based (IB) assignments to Bayesian belief networks were originally pro posed as abductive explanations. IB as signments assign fewer variables in abduc tive explanations than do schemes assign ing values to all evidentially supported vari ables. We use IB assignments to approxi mate marginal probabilities in Bayesian be lief networks. Recent work in belief up dating for Bay...
This tutorial teaches dynamic multithreaded algorithms using a Cilk-like [11, 8, 10] model. The material was taught in the MIT undergraduate class 6.046 Introduction to Algorithms as two 80-minute lectures. The style of the lecture notes follows that of the textbook by Cormen, Leiserson, Rivest, and Stein [7], but the pseudocode from that textbook has been “Cilkified” to allow it to describe mu...
We present non-standard denotational specifications of the SSAform and of its conversion processes from and to imperative pro-gramming languages. Thus, we provide a strong mathematicalfoundation for this intermediate code representation language usedin modern compilers such as GCC or Intel CC.More specifically, we provide (1) a new functional approachto SSA, the Static S...
This thesis proposes a general framework for equational logic programming, called catf:gory based equational logic by placing the general principles underlying the design of the pro gramming language Eqlog and formulated by Goguen and Meseguer into an abstract form. This framework generalises equational deduction to an arbitrary category satisfy ing certain natural conditions; completeness i...
An increase in address size is a discontinuity: the Abstract fraction of ‘‘interesting’’ bits in a pointer shrinks a lot. Programs that were pushing the limits of the old Many users need 64-bit architectures: 32-bit sysaddress space consume almost none of the new adtems cannot support the largest applications, and 64dress space. bit systems perform better for some applications. However, perform...
All along this dissertation we present our works related to the scope of integer linear pro gramming This work come from those done by L Lov asz and A Schrijver in L Lov asz and A Schrijver Cones of matrices set functions and optimization SIAM First we present extensively their work in order to make it more accessible Thus we show clearly the relations between integer programming and positive s...
In the development of provably error free control software for manufacturing systems the application of Petri nets is a well known approach One of the main advantages of Petri nets are their sound mathematical background which make it possible to analyse and validate the qualitative and quantitative behavior of a Petri net system by formal methods The gap between the validated Petri net model a...
Compare rst-order functional programs with higher-order programs allowing functions asfunction parameters. Can the the rst program class solve fewer problems than the second?The answer is no: both classes are Turing complete, meaning that they can compute allpartial recursive functions. In particular, higher-order values may be rst-order simulatedby use of the list constructor \...
s/src-tn-1997-009.html [3] Edsger W. Dijkstra. A Discipline of Programming, Pren-tice-Hall, Inc., 1976. [4] J. A. Robinson. “A Machine-Oriented Logic Based on theResolution Principle,” in Journal of the ACM, Vol. 12, No. 1,pgs 23-41, January, 1965. [5] Greg Nelson. Techniques for Program Verification, Tech-nical Report CSL-81-10, Xerox Palo Alto Research Center,June, 1981. h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید