Results 1  10
of
13,219
KripkePlatek Set Theory And The AntiFoundation Axiom
"... . The paper investigates the strength of the AntiFoundation Axiom, AFA, on the basis of KripkePlatek set theory without Foundation. It is shown that the addition of AFA considerably increases the proof theoretic strength. MSC:03F15,03F35 Keywords: Antifoundation axiom, KripkePlate set theory ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
. The paper investigates the strength of the AntiFoundation Axiom, AFA, on the basis of KripkePlatek set theory without Foundation. It is shown that the addition of AFA considerably increases the proof theoretic strength. MSC:03F15,03F35 Keywords: Antifoundation axiom, KripkePlate set
Fragments of KripkePlatek Set Theory with Infinity
, 1992
"... In this paper we shall investigate fragments of KripkePlatek set theory with Infinity which arise from the full theory by restricting Foundation to \Pi n Foundation, where n 2. The strength of such fragments will be characterized in terms of the smallest ordinal ff such that L ff is a model o ..."
Abstract

Cited by 7 (5 self)
 Add to MetaCart
In this paper we shall investigate fragments of KripkePlatek set theory with Infinity which arise from the full theory by restricting Foundation to \Pi n Foundation, where n 2. The strength of such fragments will be characterized in terms of the smallest ordinal ff such that L ff is a model
The AntiFoundation Axiom In Constructive Set Theories
 Stanford University Press
, 2003
"... . The paper investigates the strength of the antifoundation axiom on the basis of various systems of constructive set theories. 1. Introduction Intrinsically circular phenomena have come to the attention of researchers in differing fields such as mathematical logic, computer science, artificial inte ..."
Abstract

Cited by 7 (6 self)
 Add to MetaCart
of circular notions in computer science (cf. [7]). Instead of the Foundation Axiom these set theories adopt the socalled AntiFoundation Axiom, AFA, which gives rise to a rich universe of sets. AFA provides an elegant tool for modeling all sorts of circular phenomena. The application areas range from
PREDICATIVITY, CIRCULARITY, AND ANTIFOUNDATION
"... Abstract. The antifoundation axiom, AFA, has turned out to be a versatile principle in set theory for modelling a plethora of circular and selfreferential phenomena. This paper explores whether AFA and the most important tools emanating from it, such as the solution lemma and the corecursion prin ..."
Abstract
 Add to MetaCart
Abstract. The antifoundation axiom, AFA, has turned out to be a versatile principle in set theory for modelling a plethora of circular and selfreferential phenomena. This paper explores whether AFA and the most important tools emanating from it, such as the solution lemma and the co
A Bounded Set Theory with AntiFoundation Axiom and Inductive Definability
 Computer Science Logic, 8th Workshop, CSL'94 Kazimierz
, 1995
"... this paper let \Deltaformulas and \Deltaterms be those defined as \Delta R with the construct theleast omitted. (They define predicates and operations also known as basic [Gan74] or rudimentary [Jen72] ones.) Note, that provablytotal \Sigma definable operations in KP 0 coincide with those defin ..."
Abstract

Cited by 5 (1 self)
 Add to MetaCart
definable by \Deltaterms [Saz85, Saz85a, Saz87]. Therefore, we may use the name KP 0 also for the subtheory of KPR 0 , based on this \Deltalanguage, which does not involve both the term construct theleast and the corresponding axiom. Analogously, \Delta R (\Delta
Domain Theory
 Handbook of Logic in Computer Science
, 1994
"... Least fixpoints as meanings of recursive definitions. ..."
Abstract

Cited by 546 (25 self)
 Add to MetaCart
Least fixpoints as meanings of recursive definitions.
LatticeBased Access Control Models
, 1993
"... The objective of this article is to give a tutorial on latticebased access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels in the ..."
Abstract

Cited by 1485 (56 self)
 Add to MetaCart
The objective of this article is to give a tutorial on latticebased access control models for computer security. The paper begins with a review of Denning's axioms for information flow policies, which provide a theoretical foundation for these models. The structure of security labels
Planning Algorithms
, 2004
"... This book presents a unified treatment of many different kinds of planning algorithms. The subject lies at the crossroads between robotics, control theory, artificial intelligence, algorithms, and computer graphics. The particular subjects covered include motion planning, discrete planning, planning ..."
Abstract

Cited by 1108 (51 self)
 Add to MetaCart
This book presents a unified treatment of many different kinds of planning algorithms. The subject lies at the crossroads between robotics, control theory, artificial intelligence, algorithms, and computer graphics. The particular subjects covered include motion planning, discrete planning
Logical foundations of objectoriented and framebased languages
 JOURNAL OF THE ACM
, 1995
"... We propose a novel formalism, called Frame Logic (abbr., Flogic), that accounts in a clean and declarative fashion for most of the structural aspects of objectoriented and framebased languages. These features include object identity, complex objects, inheritance, polymorphic types, query methods, ..."
Abstract

Cited by 880 (64 self)
 Add to MetaCart
, encapsulation, and others. In a sense, Flogic stands in the same relationship to the objectoriented paradigm as classical predicate calculus stands to relational programming. Flogic has a modeltheoretic semantics and a sound and complete resolutionbased proof theory. A small number of fundamental concepts
Strategies of Discourse Comprehension
, 1983
"... El Salvador, Guatemala is a, study in black and white. On the left is a collection of extreme MarxistLeninist groups led by what one diplomat calls “a pretty faceless bunch of people.’ ’ On the right is an entrenched elite that has dominated Central America’s most populous country since a CIAbacke ..."
Abstract

Cited by 601 (27 self)
 Add to MetaCart
marimba bands and set off firecrackers on the night Ronald Reagan was elected. They considered Reagan an ideological kinsman and believed they had a special
Results 1  10
of
13,219