Results 1  10
of
99,153
Solvability of Word Equations Modulo Finite Special And Confluent StringRewriting Systems Is Undecidable In General
 Information Processing Letters 53
, 1995
"... A finite special and confluent stringrewriting system S is constructed such that it is undecidable in general whether a word equation is solvable mod S. Thus, (word) unification mod S is undecidable. 1 Introduction The problem of deciding whether an equation has a solution is one of the most funda ..."
Abstract

Cited by 3 (3 self)
 Add to MetaCart
A finite special and confluent stringrewriting system S is constructed such that it is undecidable in general whether a word equation is solvable mod S. Thus, (word) unification mod S is undecidable. 1 Introduction The problem of deciding whether an equation has a solution is one of the most
Confluent Monadic StringRewriting Systems and Automatic Structures
"... If a monoid M is presented through a finite, special, and confluent stringrewriting system, then the set of irreducible strings is part of an automatic structure for M that is simultaneously "ll, lr, rl, and rrautomatic. However, if the presentation is regular instead of finite or monadic i ..."
Abstract

Cited by 6 (2 self)
 Add to MetaCart
If a monoid M is presented through a finite, special, and confluent stringrewriting system, then the set of irreducible strings is part of an automatic structure for M that is simultaneously "ll, lr, rl, and rrautomatic. However, if the presentation is regular instead of finite or monadic
Term Rewriting Systems
, 1992
"... Term Rewriting Systems play an important role in various areas, such as abstract data type specifications, implementations of functional programming languages and automated deduction. In this chapter we introduce several of the basic comcepts and facts for TRS's. Specifically, we discuss Abstra ..."
Abstract

Cited by 613 (18 self)
 Add to MetaCart
Term Rewriting Systems play an important role in various areas, such as abstract data type specifications, implementations of functional programming languages and automated deduction. In this chapter we introduce several of the basic comcepts and facts for TRS's. Specifically, we discuss
A Guided Tour to Approximate String Matching
 ACM COMPUTING SURVEYS
, 1999
"... We survey the current techniques to cope with the problem of string matching allowing errors. This is becoming a more and more relevant issue for many fast growing areas such as information retrieval and computational biology. We focus on online searching and mostly on edit distance, explaining t ..."
Abstract

Cited by 584 (38 self)
 Add to MetaCart
We survey the current techniques to cope with the problem of string matching allowing errors. This is becoming a more and more relevant issue for many fast growing areas such as information retrieval and computational biology. We focus on online searching and mostly on edit distance, explaining
KodairaSpencer theory of gravity and exact results for quantum string amplitudes
 Commun. Math. Phys
, 1994
"... We develop techniques to compute higher loop string amplitudes for twisted N = 2 theories with ĉ = 3 (i.e. the critical case). An important ingredient is the discovery of an anomaly at every genus in decoupling of BRST trivial states, captured to all orders by a master anomaly equation. In a particu ..."
Abstract

Cited by 545 (60 self)
 Add to MetaCart
We develop techniques to compute higher loop string amplitudes for twisted N = 2 theories with ĉ = 3 (i.e. the critical case). An important ingredient is the discovery of an anomaly at every genus in decoupling of BRST trivial states, captured to all orders by a master anomaly equation. In a
The Semantics Of Constraint Logic Programs
 JOURNAL OF LOGIC PROGRAMMING
, 1996
"... This paper presents for the first time the semantic foundations of CLP in a selfcontained and complete package. The main contributions are threefold. First, we extend the original conference paper by presenting definitions and basic semantic constructs from first principles, giving new and comp ..."
Abstract

Cited by 872 (14 self)
 Add to MetaCart
since almost all CLP systems use an incomplete solver. Third, we give conditions on the (possibly incomplete) solver which ensure that the operational semantics is confluent, that is, has independence of literal scheduling.
On String Rewriting Systems —DRAFT—
, 2012
"... String rewriting systems, also known as semiThue systems, consist of a set of rules l → r, specifying valid replacements of substrings of strings over a given alphabet. In the case of one single rule, it is an open problem whether there is a system that is neither terminating nor looping. Another o ..."
Abstract
 Add to MetaCart
open question is the decidability of termination. Difficulties arise especially for nonconfluent systems. In this article, we develop strategies for approaching nonconfluent string rewriting in general, not necessarily requiring only one rule. For a given system, we define an equivalent system
The large N limit of superconformal field theories and supergravity
, 1998
"... We show that the large N limit of certain conformal field theories in various dimensions include in their Hilbert space a sector describing supergravity on the product of AntideSitter spacetimes, spheres and other compact manifolds. This is shown by taking some branes in the full M/string theory and ..."
Abstract

Cited by 5673 (21 self)
 Add to MetaCart
We show that the large N limit of certain conformal field theories in various dimensions include in their Hilbert space a sector describing supergravity on the product of AntideSitter spacetimes, spheres and other compact manifolds. This is shown by taking some branes in the full M/string theory
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
 In Network and Distributed Systems Security Symposium
, 2005
"... Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we nee ..."
Abstract

Cited by 634 (30 self)
 Add to MetaCart
, and hence works on commodity software. To demonstrate this idea, we have implemented TaintCheck, a mechanism that can perform dynamic taint analysis by performing binary rewriting at run time. We show that TaintCheck reliably detects most types of exploits. We found that TaintCheck produced no false
Qualitative process theory
 MIT AI Lab Memo
, 1982
"... Objects move, collide, flow, bend, heat up, cool down, stretch, compress. and boil. These and other things that cause changes in objects over time are intuitively characterized as processes. To understand commonsense physical reasoning and make programs that interact with the physical world as well ..."
Abstract

Cited by 884 (92 self)
 Add to MetaCart
. Several extended examples illustrate the utility of the theory, including figuring out that a boiler can blow up, that an oscillator with friction will eventually stop, and how to say that you can pull with a string, but not push with it. 1
Results 1  10
of
99,153