Friday, February 27, 2015

 

 



Soy un nuevo usuario

Olvidé mi contraseña

Entrada usuarios

Lógica Matemáticas Astronomía y Astrofísica Física Química Ciencias de la Vida
Ciencias de la Tierra y Espacio Ciencias Agrarias Ciencias Médicas Ciencias Tecnológicas Antropología Demografía
Ciencias Económicas Geografía Historia Ciencias Jurídicas y Derecho Lingüística Pedagogía
Ciencia Política Psicología Artes y Letras Sociología Ética Filosofía
 

rss_1.0 Clasificación por Disciplina

Nomenclatura Unesco > (11) Lógica

Mostrando recursos 281 - 300 de 140,063

281. PRODUCT-TERM BASED SYNTHESIZEABLE EMBEDDED PROGRAMMABLE LOGIC CORES - Andy Chee Wai Yan
As integrated circuits become increasingly complex, the ability to make post-fabrication changes will become more important and attractive. This ability can be realized using programmable logic cores. Currently, such cores are available from vendors in the form of “hard ” macro layouts. Previous work has suggested an alternative approach: vendors supply a synthesizable version of their programmable logic core and the integrated circuit designer synthesizes the programmable logic fabric using standard cells. Although this technique suffers increased delay, area, and power, the task of integrating such cores is far easier than the task of integrating “hard ” cores into an...

282. Construcción de la memoria colectiva y género - Vega, Marina; Barcaglioni, Gabriela
Este trabajo pone en discusión la problemática, reflexiona sobre el derecho a la verdad de las víctimas, utilizando el género para abordar los testimonios de sobrevivientes, víctimas de violencia sexual, de los campos clandestinos de detención que funcionaron durante la última dictadura en Argentina. Las reflexiones que surgen, indagan, vinculan la visibilidad del movimiento de mujeres en Argentina, la legislación que reconoce y garantiza derechos a las mujeres y la inclusión en la agenda pública y política de cuestiones vinculadas a las violencias de género. Las especulaciones llevan a pensar cuánto incide en la relectura de las experiencias y del...

283. Determinación de perfiles de estudiantes y de rendimiento académico mediante la utilización de datos de la UTN-FFRe - Red Martínez, David L. la; Karanik, Marcelo J.; Giovannini, Mirtha E.
Durante el cursado de la carrera Ingeniería en Sistemas de Información de la Facultad Regional Resistencia de la Universidad Tecnológica Nacional (UTNFRRe) los alumnos deben ajustarse a un régimen de correlatividades, para poder cursar asignaturas de años posteriores. En este contexto, existen materias que son consideradas críticas ya que pueden provocar retrasos en el normal desempeño del alumno. Una de esas materias es Algoritmos y Estructuras de Datos que plantea desafíos relacionados con la lógica de la programación. Actualmente, la cantidad de alumnos que regularizan y aprueban la asignatura es considerablemente baja, aportando al desgranamiento y deserción en los primeros...

284. Modelo del estudiante basado en la lógica difusa - Huapaya, Constanza Raquel; Lizarralde, Francisco A.; Vivas, Jorge; Gonzalez, Marcela P.; Guccione, Leonel; Arona, Graciela
El modelo del estudiante representa las características individuales de los alumnos, especialmente las cognitivas. El estado cognitivo no puede ser observado y medido directamente. Su medición presenta gran dificultad debido, entre otros motivos, a la incertidumbre originada en el enfoque interpretativo que hace el docente sobre la actividad del estudiante y a la imperfección de la información que se adquiere. Uno de los enfoques con el que se trata la incertidumbre es la Lógica Difusa. Nuestra investigación tratará esta problemática mediante el desarrollo de un modelo difuso del estudiante. La estructura del modelo del estudiante comprenderá un modelo perturbación para representar las...

285. Cut-elimination and the decidability of reachability in alternating pushdown systems - Dowek, Gilles; Jiang, Ying
We propose a new approach to formalize alternating pushdown systems as natural-deduction style inference systems. In this approach, the decidability of reachability can be proved as a simple consequence of a cut-elimination theorem for the corresponding inference system. Then, we show how this result can be used to extend an alternating pushdown system into a complete system where, for every configuration $A$, either $A$ or $\neg A$ is provable. The key idea is that cut-elimination permits to build a system where a proposition of the form $\neg A$ has a co-inductive (hence possibly infinite) proof if and only if it...

286. A System of Interaction and Structure IV: The Exponentials and Decomposition - Straßburger, Lutz; Guglielmi, Alessio
International audience

287. Improving Decision-Making for Fuzzy Logic-based Routing in Wireless Sensor Networks - Ahvar, Ehsan; M Ortiz, Antonio; CRESPI, Noel
International audience

288. Algebra and Coalgebra in Light Linear Logic - Gaboardi, Marco; Péchoux, Romain
Algebra and coalgebra are widely used to model data types in functional programming languages and proof assistants. Their use permits to better structure the computations and also to enhance the expressivity of a language or of a proof system. The use of algebras and coalgebras in proof assistants relies on the possibility of integrating them in strongly normalizing languages such as System F or the calculus of constructions without loosing the good logical properties of the calculus. In fact, in those systems it is possible to define weak (initial) algebras and weak (final) coalgebra by using parametric polymorphism. In this work we study...

289. [en] REUSE OF DOMAIN-SENSITIVE STRATEGIES FOR DETECTING CODE ANOMALIES: A MULTI-CASE STUDY - ALEXANDRE LEITE SILVA
[pt] Para promover a longevidade de sistemas de software, estratégias de detecção são reutilizadas para identificar anomalias relacionadas a problemas de manutenção, tais como classes grandes, métodos longos ou mudanças espalhadas. Uma estratégia de detecção é uma heurística composta por métricas de software e limiares, combinados por operadores lógicos, cujo objetivo é detectar um tipo de anomalia. Estratégias pré-definidas são usualmente aplicadas globalmente no programa na tentativa de revelar onde se encontram os problemas críticos de manutenção. A eficiência de uma estratégia de detecção está relacionada ao seu reuso, dado o conjunto de projetos de uma organização. Caso haja necessidade...

290. O rateio de ICMS por desempenho de municípios no Ceará e seu impacto em indicadores do sistema de avaliação da educação - Brandão, Júlia Barbosa
De todo ICMS arrecadado pelos estados brasileiros, 25% é distribuído aos municípios. Os estados são responsáveis por definir as regras de distribuição de 25% destes 25% do ICMS que é transferido aos municípios, os outros 75% seguem o critério do Valor Adicionado Fiscal. Alguns estados alteraram suas leis para que a distribuição seja realizada em função do desempenho dos municípios em algumas áreas com o intuito de incentiva-lo a melhorarem sua performance em busca de uma maior fatia do ICMS. Seguindo esta lógica está o estado do Ceará onde 100% do ICMS distribuído segundo regras estaduais é calculado a partir...

291. Studien zur Theorie der Möglichkeit und Ähnlichkeit : allgemeine Theorie der Verwandtschaft gegenständlicher Bestimmungen / - Mally, Ernst, 1879-1944.
Includes bibliographical references.

292. The VerCors tool for verification of concurrent programs - Blom, Stefan; Huisman, Marieke
The VerCors tool implements thread-modular static verification of concurrent programs, annotated with functional properties and heap access permissions. The tool supports both generic multithreaded and vector-based programming models. In particular, it can verify multithreaded programs written in Java, specified with JML extended with separation logic. It can also verify parallelizable programs written in a toy language that supports the characteristic features of OpenCL. The tool verifies programs by first encoding the specified program into a much simpler programming language and then applying the Chalice verifier to the simplified program. In this paper we discuss both the implementation of the tool...

293. Resource protection using atomics: patterns and verification - Amighi, Afshin; Blom, Stefan; Huisman, Marieke
For the verification of concurrent programs, it is essential to be able to show that synchronisation mechanisms are implemented correctly. A common way to implement such sychronisers is by using atomic operations. This paper identifies what different synchronisation patterns can be implemented by using atomic read, write and compare-and-set operation. Additionally, this paper proposes also a specification of these operations in Java’s AtomicInteger class, and shows how different synchronisation mechanisms can be built and verified using atomic integer as the synchronisation primitive. The specifications for the methods in the AtomicInteger class are derived from the classical concurrent separation logic rule for...

294. Text and Music in Romanian Oral Epic - Margaret Hiebert Beissinger
Studies of oral composition in epic poetry have traditionally focused on textual analyses. However, since oral epic is a sung genre, the relationships between text and music are fundamental to understanding oral composition. Does the music aid the singer in the composition of the text? What types of patterns are evident as singers combine text and music? What determines units of structure in the text and music? In an attempt to confront these and other questions, I will be analyzing the relationships between units of textual and melodic structure in the epic song repertoires of six contemporary Romanian traditional singers....

295. From - Of Neu
coun plasm tinct neur glion tumo of a char nent, cytom an be-ade ner-in a and 13– lio-izure logic sure. raxis lobe s of mis-

296. Performance Comparison of the AODV, SAODV and FLSL Routing Protocols in Mobile Ad Hoc Networks - Lu Jin; Zhongwei Zhang; Hong Zhou
Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it dif-ficult to utilize the existing techniques for network ser-vices, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we first deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. Then we carry out a number of experiments using NS-2 to compare the performance of AODV, SAODV and FLSL...

297. References - David Kruml
The statical part of quantum logic can be described by projections on a Hilbert space, or more ab-stractly, by an orthomodular lattice (OML). There are good reasons to consider the Sasaki projection (generalizing the composition of projections) and its adjoint the Sasaki hook as the main structural oper-ations on the OML. In [1] Kröger used the binary variants of the Sasaki operations (called skew meet and skew join) to axiomatize OMLs as skew Boolean lattices. It is natural to seek common generalizations of frames and complete OML, called skew frames (and interpreted either as “linearized frames ” or “intuition-istic OMLs”)....

298. Instruction Issue Logic for Pipelined Supercomputers - Shlomo Weiss; James E. Smi Th
Basic pr inc ip les and des ign t radeof fs for cont ro l ol p ipe l ined processors are f i rst d iscussed. We concent ra te on reg is ter- reg is ter a rch i tec tures l ike the GRAY-1 where pipel ine cont ro l logic is local ized to one or two pipel ine s tages and is re fer red to as " ins t ruct ion issue logic". Design tradeoffs are exp lored by giving des igns for a var ie ty of ins t ruct ion issue methods...

299. 1 EFFECTS OF THE BECOMING A LOVE AND LOGIC ® PARENT TRAINING PROGRAM ON PARENTS ’ PERCEPTIONS OF THEIR CHILDREN’S BEHAVIOR AND THEIR OWN PARENTAL COMPETENCE: A PRELIMINARY INVESTIGATION - Charles Fay
Over the past thirty years, severe disruptive behavior among American youth has evolved from a relatively minor concern, shared by only a few educators and parents, to a major day-to-day crisis experienced by many. Veteran teachers continually report that the

300. Nonmonotonic temporal logics that facilitate elaboration tolerant revision of goals - Chitta Baral; Jicheng Zhao
Temporal logics are widely used in specifying goals of agents. We noticed that when directing agents, humans of-ten revise their requirements for the agent, especially as they gather more knowledge about the domain. However, all ex-isting temporal logics, except one, do not focus on the revi-sion of goals in an elaboration tolerant manner. Thus formal temporal logics that can allow elaboration tolerant revision of goals are needed. As non-monotonic languages are often used for elaboration tolerant specification, we propose to ex-plore non-monotonic temporal logics for goal specification. Recently, a non-monotonic temporal logic, N-LTL, was pro-posed with similar aims. In N-LTL,...

 

Busque un recurso