Results 1  10
of
216,340
Starfree Picture Expressions are Strictly Weaker than FirstOrder Logic
 Automata, Languages and Programming, volume 1256 of Lect. Notes Comput. Sci
, 1997
"... . We exhibit a firstorder definable picture language which we prove is not expressible by any starfree picture expression, i. e., it is not starfree. Thus firstorder logic over pictures is strictly more powerful than starfree picture expressions are. This is in sharp contrast with the situation ..."
Abstract

Cited by 9 (0 self)
 Add to MetaCart
. We exhibit a firstorder definable picture language which we prove is not expressible by any starfree picture expression, i. e., it is not starfree. Thus firstorder logic over pictures is strictly more powerful than starfree picture expressions are. This is in sharp contrast
StarFree Languages are
, 2011
"... Abstract. The class of ChurchRosser congruential languages has been introduced by McNaughton, Narendran, and Otto in 1988. A language L is ChurchRosser congruential (belongs to CRCL), if there is a finite, confluent, and lengthreducing semiThue system S such that L is a finite union of congruenc ..."
Abstract
 Add to MetaCart
of congruence classes modulo S. To date, it is still open whether every regular language is in CRCL. In this paper, we show that every starfree language is in CRCL. In fact, we prove a stronger statement: For every starfree language L there exists a finite, confluent, and subwordreducing semiThue system
Exact Sampling with Coupled Markov Chains and Applications to Statistical Mechanics
, 1996
"... For many applications it is useful to sample from a finite set of objects in accordance with some particular distribution. One approach is to run an ergodic (i.e., irreducible aperiodic) Markov chain whose stationary distribution is the desired distribution on this set; after the Markov chain has ..."
Abstract

Cited by 548 (13 self)
 Add to MetaCart
For many applications it is useful to sample from a finite set of objects in accordance with some particular distribution. One approach is to run an ergodic (i.e., irreducible aperiodic) Markov chain whose stationary distribution is the desired distribution on this set; after the Markov chain
A calculus for cryptographic protocols: The spi calculus
 Information and Computation
, 1999
"... We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the ..."
Abstract

Cited by 919 (55 self)
 Add to MetaCart
; the spi calculus enables us to consider cryptographic issues in more detail. We represent protocols as processes in the spi calculus and state their security properties in terms of coarsegrained notions of protocol equivalence.
Concurrent Constraint Programming
, 1993
"... This paper presents a new and very rich class of (concurrent) programming languages, based on the notion of comput.ing with parhal information, and the concommitant notions of consistency and entailment. â€™ In this framework, computation emerges from the interaction of concurrently executing agent ..."
Abstract

Cited by 502 (16 self)
 Add to MetaCart
text of concurrency because of the use of constraints for communication and control, and in the context of AI because of the availability of simple yet powerful mechanisms for controlling inference, and the promise that very rich representational/programming languages, sharing the same set of abstract properties, may
Fast Parallel Algorithms for ShortRange Molecular Dynamics
 JOURNAL OF COMPUTATIONAL PHYSICS
, 1995
"... Three parallel algorithms for classical molecular dynamics are presented. The first assigns each processor a fixed subset of atoms; the second assigns each a fixed subset of interatomic forces to compute; the third assigns each a fixed spatial region. The algorithms are suitable for molecular dyn ..."
Abstract

Cited by 622 (6 self)
 Add to MetaCart
. The algorithms are tested on a standard LennardJones benchmark problem for system sizes ranging from 500 to 100,000,000 atoms on several parallel supercomputers  the nCUBE 2, Intel iPSC/860 and Paragon, and Cray T3D. Comparing the results to the fastest reported vectorized Cray YMP and C90 algorithm shows
The English noun phrase in its sentential aspect
, 1987
"... This dissertation is a defense of the hypothesis that the noun phrase is headed by afunctional element (i.e., \nonlexical " category) D, identi ed with the determiner. In this way, the structure of the noun phrase parallels that of the sentence, which is headed by In (ection), under assump ..."
Abstract

Cited by 509 (4 self)
 Add to MetaCart
assumptions now standard within the GovernmentBinding (GB) framework. The central empirical problem addressed is the question of the proper analysis of the socalled \Possing " gerund in English. This construction possesses simultaneously many properties of sentences, and many properties of noun
DecisionTheoretic Planning: Structural Assumptions and Computational Leverage
 JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH
, 1999
"... Planning under uncertainty is a central problem in the study of automated sequential decision making, and has been addressed by researchers in many different fields, including AI planning, decision analysis, operations research, control theory and economics. While the assumptions and perspectives ..."
Abstract

Cited by 510 (4 self)
 Add to MetaCart
related methods, showing how they provide a unifying framework for modeling many classes of planning problems studied in AI. It also describes structural properties of MDPs that, when exhibited by particular classes of problems, can be exploited in the construction of optimal or approximately optimal policies
LatticeBased Access Control Models
, 1993
"... The objective of this article is to give a tutorial on latticebased access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels in the ..."
Abstract

Cited by 1485 (56 self)
 Add to MetaCart
in the military and government sectors, and the resulting lattice is discussed. This is followed by a review of the BellLaPadula model, which enforces information flow policies by means of its simplesecurity and *properties. It is noted that information flow through covert channels is beyond the scope
The moderatorâ€“mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
 Journal of Personality and Social Psychology
, 1986
"... In this article, we attempt to distinguish between the properties of moderator and mediator variables at a number of levels. First, we seek to make theorists and researchers aware of the importance of not using the terms moderator and mediator interchangeably by carefully elaborating, both conceptua ..."
Abstract

Cited by 5261 (7 self)
 Add to MetaCart
In this article, we attempt to distinguish between the properties of moderator and mediator variables at a number of levels. First, we seek to make theorists and researchers aware of the importance of not using the terms moderator and mediator interchangeably by carefully elaborating, both
Results 1  10
of
216,340