• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 27
Next 10 →

Debugging Overconstrained Declarative Models Using Unsatisfiable Cores

by Ilya Shlyakhter, Robert Seater, Daniel Jackson, Manu Sridharan, Mana Taghdiri - In 18th IEEE International Conference on Automated Software Engineering , 2003
"... Declarative models, in which conjunction and negation are freely used, are susceptible to unintentional overconstraint. Core extraction is a new analysis that mitigates this problem in the context of a checker based on reduction to SAT. It exploits a recently developed facility of SAT solvers that ..."
Abstract - Cited by 31 (3 self) - Add to MetaCart
that provides an "unsatisfiable core" of an unsatisfiable set of clauses, often much smaller than the clause set as a whole. The unsatisfiable core is mapped back into the syntax of the original model, showing the user fragments of the model found to be irrelevant. This information can be a great help

Validating SAT solvers using an independent resolution-based checker: Practical implementations and other applications

by Lintao Zhang, Sharad Malik - IN PROCEEDINGS OF DATE , 2003
"... As the use of SAT solvers as core engines in EDA applications grows, it becomes increasingly important to validate their correctness. In this paper, we describe the implementation of an independent resolution-based checking procedure that can check the validity of unsatisfiable claims produced by th ..."
Abstract - Cited by 136 (6 self) - Add to MetaCart
As the use of SAT solvers as core engines in EDA applications grows, it becomes increasingly important to validate their correctness. In this paper, we describe the implementation of an independent resolution-based checking procedure that can check the validity of unsatisfiable claims produced

Insurance Companies as Financial Intermediaries: Risk

by Return, Richard W. Kopcke, Richard E. R
"... Insurance companies, by their nature, bear risks. These risks partly depend on insurers ’ ability to anticipate the frequency and magnitude of the losses that they promise to cover. Because insurers manage portfolios of assets to pay these obligations, they also bear risks similar to those of other ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
examine and regulate insurers. Often contracts also are covered by guaranty funds, which essentially allow the customers of failing insurance companies to transfer a portion of their unsatisfied claims to the other participating insurers. But, this safety network can fail if too many insurance companies

Industrial-Strength Formally Certified SAT Solving

by Ashish Darbari, Bernd Fischer, Joao Marques-silva
"... Abstract. Boolean Satisfiability (SAT) solvers are now routinely used in the ver-ification of large industrial problems. However, their application in safety-critical domains such as the railways, avionics, and automotive industries requires some form of assurance for the results, as the solvers can ..."
Abstract - Add to MetaCart
-cutable program independent of any supporting theorem prover, and (iii) that the checker certifies any SAT solver respecting the agreed format for satisfiability and unsatisfiability claims. The core of the system is a certified checker for un-satisfiability claims that is formally designed and verified in Coq

Probabilistic Satisfiability

by William Spears - Naval Research Laboratory , 1992
"... this paper is organized as follows. First, we describe the Davis Putnam algorithm. Second, we describe the NN algorithm. The essentials of Bayesian analysis are summarized in the fourth section. Section 5 explains the particular class of problems investigated, outlines the experiments performed, and ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
, and describes the results. These results will enable us to make probabilistic claims concerning the satisfiability (or unsatisfiability) of problems from the problem class investigated, using the Bayesian analysis. We present an example of this analysis. Finally, we conclude with a summary and some remarks. 2

Case, Incorporation and Economy: An Approach to Causative Constructions

by Xavier Villalba - Catalan Working Papers in Linguistics 1992, UAB, Bellaterra , 1992
"... In this paper it is argued that the causee behaves as a subject because it is a subject. It is shown that many different phenomena related to Binding, Control and Predication Theory may be accounted for under an analysis of Causative Constructions taking the causee as the subject of a Vmax selected ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
by the causative verb. Moreover, the proposed constituent structure interacts with both Case Theory and head movemeut, yielding a principled explanation of aoss-linguistic variation of Causative Constructions with respect to Case and word order. Finally, it is claimed that a last resort d e, formulated as &apos

Beyond the Rhetoric Lessons From Louisville’s Consolidation

by Volume Xx Number X, H. V. Savitch, Ronald K. Vogel, Lin Ye
"... Louisville’s consolidation with Jefferson County was the first large-scale merger to take place in the United States in more than 30 years. The authors examine this merger as a major institutional innovation that was supposed to enhance economic development. Proponents of consolidation claimed that ..."
Abstract - Add to MetaCart
Louisville’s consolidation with Jefferson County was the first large-scale merger to take place in the United States in more than 30 years. The authors examine this merger as a major institutional innovation that was supposed to enhance economic development. Proponents of consolidation claimed

Cloaking locations for anonymous location based services: A hybrid approach

by Chengyang Zhang, Yan Huang - GEOINFORMATICA , 2009
"... ... is to hide a user’s identity while still provide quality location based services. Previous work has addressed the problem of locational K-anonymity either based on centralized or decentralized schemes. However, a centralized scheme relies on an anonymizing server(AS) for location cloaking, which ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
much computation and communication overhead to the clients. The service fulfillment rate may also be unsatisfied especially when there are not enough peers nearby. This paper proposes a new hybrid framework called HiSC that balances the load between the AS and mobile clients. HiSC partitions the space

Opacity in Tiberian Hebrew: Morphology, not Phonology

by Antony D. Green - ZAS 41 Papers in Linguistics , 2004
"... The phenomenon of phonological opacity has been the subject of much debate in recent years, with scholars opposed to the Optimality Theory (OT) research program arguing that opacity proves OT must be false, while the solutions proposed within OT, such as sympathy theory and stratal OT, have proved t ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
to be unsatisfying to many OT proponents, who have found these proposals to be inconsistent with the parallelist approach to phonological processes otherwise characteristic of OT. In this paper I reexamine one of the best known cases of opacity, that found in three processes of Tiberian Hebrew (TH), and argue

Cook and Reckhow are Wrong: Subexponential Tableau Proofs for Their Family of Formulae

by Fabio Massacci , 1998
"... . It is widely believed that a family \Sigma n of unsatisfiable formulae defined by Cook and Reckhow [Proc. of the ACM Symp. on Theory of Comp. 1974] gives a lower bound of O(2 2 n ) on the proof size with analytic tableaux. This claim plays a key role in the proof that tableaux cannot polynomial ..."
Abstract - Add to MetaCart
. It is widely believed that a family \Sigma n of unsatisfiable formulae defined by Cook and Reckhow [Proc. of the ACM Symp. on Theory of Comp. 1974] gives a lower bound of O(2 2 n ) on the proof size with analytic tableaux. This claim plays a key role in the proof that tableaux cannot
Next 10 →
Results 1 - 10 of 27
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University