Provably correct theories of action

被引:0
|
作者
Univ of Toronto, Toronto, Canada [1 ]
机构
来源
J Assoc Comput Mach | / 2卷 / 293-320期
关键词
All Open Access; Bronze;
D O I
暂无
中图分类号
学科分类号
摘要
Computation theory
引用
收藏
相关论文
共 50 条
  • [21] Towards provably correct system synthesis and extension
    Giunchiglia, F
    Pecchiari, P
    Armando, A
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 1996, 12 (2-3): : 123 - 137
  • [22] Provably correct conflict prevention bands algorithms
    Narkawicz, Anthony
    Munoz, Cesar
    Dowek, Gilles
    SCIENCE OF COMPUTER PROGRAMMING, 2012, 77 (10-11) : 1039 - 1057
  • [23] Provably Correct Code Generation: A Case Study
    Wang, Qian
    Gupta, Gopal
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 118 : 87 - 109
  • [24] Provably correct runtime monitoring (extended abstract)
    Aktug, Irem
    Dam, Mads
    Gurov, Dilian
    FM 2008: FORMAL METHODS, PROCEEDINGS, 2008, 5014 : 262 - +
  • [25] Provably Correct Safety Protocol for Cooperative Platooning
    Mair, Sebastian
    Althoff, Matthias
    2024 35TH IEEE INTELLIGENT VEHICLES SYMPOSIUM, IEEE IV 2024, 2024, : 780 - 787
  • [26] Provably correct reactive control from natural language
    Lignos, Constantine
    Raman, Vasumathi
    Finucane, Cameron
    Marcus, Mitchell
    Kress-Gazit, Hadas
    AUTONOMOUS ROBOTS, 2015, 38 (01) : 89 - 105
  • [27] Provably correct reactive control from natural language
    Constantine Lignos
    Vasumathi Raman
    Cameron Finucane
    Mitchell Marcus
    Hadas Kress-Gazit
    Autonomous Robots, 2015, 38 : 89 - 105
  • [28] Provably correct edgel linking and subpixel boundary reconstruction
    Koethe, Ullrich
    Stelldinger, Peer
    Meine, Hans
    PATTERN RECOGNITION, PROCEEDINGS, 2006, 4174 : 81 - 90
  • [29] Provably correct hardware compilation using timing diagrams
    Schenke, M
    Dossis, M
    FORMAL METHODS FOR PROTOCOL ENGINEERING AND DISTRIBUTED SYSTEMS, 1999, 28 : 313 - 331
  • [30] Designing provably correct information networks with digital diodes
    Cohen, Fred
    Computers and Security, 1988, 7 (03): : 279 - 286