509 Hits in 8.4 sec

Preface to special issue: LSFA 2017 and 2018

Sandra Alves, Renata Wassermann
2021 Mathematical Structures in Computer Science  
with Protected Variables", introduces the notion of "protected variables" in a rule-based specification of nominal C-unification formalised in Coq, which gives a generalised C-unification procedure that  ...  can be used to deal with nominal C-matching and nominal equality check problems.  ...  We thank all the anonymous referees for their thorough and careful reviews and all the members of MSCS involved in processing this issue.  ... 
doi:10.1017/s096012952100044x fatcat:yfcs2dzfubexvni637ihwlynlm

Mechanized metatheory for a $$\lambda $$ λ -calculus with trust types

Rodrigo Ribeiro, Lucília Figueiredo, Carlos Camarão
2013 Journal of the Brazilian Computer Society  
In this work, we use the Coq proof assistant to formalise a λ-calculus with trust types, originally formulated by Ørbaek and Palsberg.  ...  We give formal proofs of type soundness, erasure and simulation theorems and also prove decidability of the typing problem. As a result of our formalisation a certified type checker is derived.  ...  The formalisation of a unification algorithm has been studied elsewhere [26, 32] . We let a formalisation of the type inference problem for this trust-calculus for future work.  ... 
doi:10.1007/s13173-013-0119-5 fatcat:jfdmzpfurfa3dblcubtlxootpu

Nominal Terms and Nominal Logics: From Foundations to Meta-mathematics [chapter]

Murdoch J. Gabbay
2013 Handbook of Philosophical Logic  
This is possible because of a novel name-carrying semantics in nominal sets, through which our languages will have name-permutations and term-formers that can bind as primitive built-in features.  ...  and completeness; various axiomatisations with pointers to proofs of their correctness; and we conclude with a case study stating and proving correct a finite first-order axiomatisation of arithmetic  ...  Fernández and the author introduced a notion of closed term such that for closed terms, equivariant matching/unification coincides with 'ordinary' matching/unification [FG07] .  ... 
doi:10.1007/978-94-007-6600-6_2 fatcat:wpzfdpe6gnfvxjyfpfigthcwre

A symbolic framework for multi-faceted security protocol analysis

Andrea Bracciali, Gianluigi Ferrari, Emilio Tuosto
2007 International Journal of Information Security  
, formal, so as to be provably correct, and with a computational counterpart, so as to support the (semi-) automated certification of properties.  ...  It features a clear separation between the modeling of the protocol functioning and the properties it is expected to enforce, the former in terms of a calculus, the latter in terms of a logic.  ...  SPL has many similarities with cIP, for instance input prefixes embed a pattern matching mechanism such that variables are instantiated when a matching message is received.  ... 
doi:10.1007/s10207-007-0043-9 fatcat:ihm7rmm4j5fxdjz3smymzbqcy4

More Modal Semantics without Possible Worlds

Daniel Skurt, Hitoshi Omori
2016 IfColog journal of logics and their applications (FLAP)  
A unifier of two terms s and t is a substitution σ such that sσ " tσ and for first-order terms there exists a most general unifier σ in the sense that any other unifier δ can be composed from σ with some  ...  Essential unification may even reduce an infinitary theory to We would like to thank our first reviewer at the unification workshop in 2008 and the interesting discussion there and afterwards with several  ...  Acknowledgements We like to thank our first reviewer at the unification workshop in 2008 and the interesting discussion there and afterwards with several participants of the workshop.  ... 
dblp:journals/flap/SkurtO16 fatcat:otzojve45vdzjderdms77skfsm


José María Serrano, María Dolores Gadea, Marcela Sabaté
2017 Revista de Historia Económica / Journal of Iberian and Latin American Economic History  
This paper presents a chronology of the moments when the adjustment was crucial, which, consistent with the macro-trilemma, coincided with periods of external openness.  ...  Moreover, this paper provides empirical support to the thesis that links the exceptionality of a floating peseta during the gold standard with fiscal profligacy.  ...  We formalise this trade-off between integration and the speed of exchange rates reverting to equilibrium through a non-parametric approach and find a systematic negative relationship between the Spanish  ... 
doi:10.1017/s0212610917000040 fatcat:7fg4aq4xnzgcve32ez64r3ku6m

When Eastern Labour Markets Enter Western Europe: CEECs Labour Market Institutions Upon Euro Zone Accession

Joanna Tyrowicz
2009 Social Science Research Network  
Traditionally, labour markets are a key concept in the optimal currency area theory, playing the role of the only accommodation mechanism of asymmetric shocks after the monetary unification.  ...  Many empirical studies addressed these issues too, yielding important policy implications for labour market reforms in the process of monetary unification.  ...  Indeed, such a long perspective combined with the little experience Europe has with common currency should suggest humbleness in 37 See Halko (2003) for a formalised theoretical model, calibrated simulation  ... 
doi:10.2139/ssrn.1752092 fatcat:qj46pppmfjfwdidifkh3vwk3ri

Empirical Studies of Structural Changes and Inflation

Bank for International Settlements
2001 Social Science Research Network  
Although these forecasts are made with an assumption of no change in the exchange rate, when we revisit them, with the actual path of the exchange rate known, outcomes remain lower than predicted (by,  ...  Stevens (1999) provides an assessment of Australia's inflation experience over the 1990s. 3 Bootle (1996) is a prominent example of this claim. 4 In the long run, these developments are likely to lower  ...  system to match the variable generated by (B.5). 16 15 In other words, factors are meant to be able to replace all variables that could appear in (B.1) with no significant loss of information.  ... 
doi:10.2139/ssrn.1171300 fatcat:uk526bv3qfga3nshaxlyeuys6e

Decision Analysis for Management of Natural Hazards

Michael Simpson, Rachel James, Jim W. Hall, Edoardo Borgomeo, Matthew C. Ives, Susana Almeida, Ashley Kingsborough, Theo Economou, David Stephenson, Thorsten Wagener
2016 Annual Review Environment and Resources  
Please refer to any applicable terms of use of the publisher. University of Bristol -Explore Bristol Research General rights This document is made available in accordance with publisher policies.  ...  Full terms of use are available:  ...  losses (risks), R 0 , R 1 , R 2 ,…, R n ), and costs C 0 , C 1 , C 2 ,…, C n , where by definition C 0 =0.  ... 
doi:10.1146/annurev-environ-110615-090011 fatcat:cpgksw5ppfgg5ndpwbuqhncz2m

Building a Bank Resolution Fund Over Time: When Should Each Individual Bank Contribute?

Javier Villar Burke
2014 Social Science Research Network  
As a consequence the level of reserves in the EA is determined through an interaction between the terms of the l a r c i e r economy with liquidity, the monetary base has been on an uninterrupted upward  ...  That BU will be based on three pillars: shifting the supervision of banks to the European level through a Single Supervisory Mechanism, a common system for deposit protection and an integrated bank crisis  ...  A sustained extraordinary benefit signals the existence of a market failure, e.g. a monopoly. The  ... 
doi:10.2139/ssrn.2535722 fatcat:rsh6qxi55zdu5dnmypbzmymfg4

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware [chapter]

Sam L. Thomas, Flavio D. Garcia, Tom Chothia
2017 Lecture Notes in Computer Science  
of ASCII characters followed by a terminating NULL byte (i.e., a C-style string).  ...  We use our unification of unpacking tools (BinWalk 2 , Firmware Mod Kit 3 and Binary Analysis Toolkit 4 ) with the improvements detailed in Section 3.5.  ... 
doi:10.1007/978-3-319-60876-1_13 fatcat:5shz3ut74ndlzo4vbq3mczb2ia

Scientific Opinion on the state of the art of Toxicokinetic/Toxicodynamic (TKTD) effect models for regulatory risk assessment of pesticides for aquatic organisms

Colin Ockleford, Paulien Adriaanse, Philippe Berny, Theodorus Brock, Sabine Duquesne, Sandro Grilli, Antonio F Hernandez‐Jerez, Susanne Hougaard Bennekou, Michael Klein, Thomas Kuhl, Ryszard Laskowski, Kyriaki Machera (+16 others)
2018 EFSA Journal  
Following a request from EFSA, the Panel on Plant Protection Products and their Residues (PPR) developed an opinion on the state of the art of Toxicokinetic/Toxicodynamic (TKTD) models and their use in  ...  TKTD models are species- and compound-specific and can be used to predict (sub)lethal effects of pesticides under untested (time-variable) exposure conditions.  ...  For what concerns the calibration data, the actual profile in the study matched the nominal concentrations reasonably well (mean measured concentrations between 95% and 112% of the nominal).  ... 
doi:10.2903/j.efsa.2018.5377 pmid:32626020 pmcid:PMC7009662 fatcat:cxjegpzf5fdzrbewpnt6ayx65m

A Roadmap for Web Mining: From Web to Semantic Web [chapter]

Bettina Berendt, Andreas Hotho, Dunja Mladenic, Maarten van Someren, Myra Spiliopoulou, Gerd Stumme
2004 Lecture Notes in Computer Science  
Some methods are hierarchical and construct clusters of clusters. The objects are described with numerical or nominal variables.  ...  A pattern is matched with the text in the document. If the pattern matches a fragment it indicates where the target information is.  ... 
doi:10.1007/978-3-540-30123-3_1 fatcat:tb4oxi6dkbgypeoephofr2ewmi

Resolving Relative Time Expressions in Dutch Text with Constraint Handling Rules [chapter]

Matje van de Camp, Henning Christiansen
2013 Lecture Notes in Computer Science  
We discuss the semantics of NL coordination in modern type theories (MTTs) with coercive subtyping. The issue of conjoinable types is handled by means of a type universe of linguistic types.  ...  This is achieved without requiring annotation at the level of individual words, via a method compatible with work on linguistic change and routinisation. Abstract.  ...  Acknowledgments This work was partly funded by a JAE Predoctoral Fellowship from CSIC (Spain).  ... 
doi:10.1007/978-3-642-41578-4_10 fatcat:rvzj2l4fnvg77aepokghncuhui

General Chairman's Message

1983 1983 IEEE Symposium on Security and Privacy  
Thanks also go to Alan Bundy for his encouragement with regard to this work.  ...  We also acknowledge the very helpful comments of our colleagues Myla Archer and Bruce Labaw on earlier drafts of this paper.  ...  During a proof, substitutions are generated for the existential variables through unification and equality replacement.  ... 
doi:10.1109/sp.1983.10000 fatcat:gwmwca6z6vcs7oo44rri25ie4i
« Previous Showing results 1 — 15 out of 509 results