Most computer programs store elements of a given nature into container-based data structures such as lists, arrays, sets, and multisets. To verify the correctness of these programs, one needs to combine a theory modeling the data structure with a theory modeling the elements. This combination can be achieved using the classic Nelson-Oppen method only if both theories are stably infinite. The goal of this report is to relax the stable infiniteness requirement. To achieve this goal, we introduce the notion of polite theories, and we show that natural examples of polite theories include those modeling data structures such as lists, arrays, sets, and multisets. Furthemore, we provide a method that is able to combine a polite theory with any the...
Les techniques issues du traitement automatique des langues (TAL) permettent de mettre au jour des i...
An algorithm for finding small-weight words in large linear codes is developed. It is in particular ...
Deadlock detection is an interesting problem in MultiDataBase Systems (MDBS), since if all local tra...
Most computer programs store elements of a given nature into container-based data structures such as...
This paper is dedicated to a new binomial lattice method (MSM) consistent with the Black-Scholes mod...
A mixed variational-smoothing data assimilation method is derived under the perfect-model hypothesis...
This paper defines a new framework for fast prototyping of static analyzers based on rewriting techn...
In this report, we propose a number of new ways of detecting activations in fMRI sequences that requ...
The aim of this article is to present some new stability sufficient conditions for discrete-time non...
This paper investigates structural properties of occurrence (Petri) nets and their interpretation as...
Herein, we propose a local registration method for cartographic road networks on SPOT satellite imag...
A control strategy for tracking an omnidirectional target with a unicycle-like robot is proposed. An...
This paper presents a combination of verification and conformance testing techniques for the formal ...
International audienceThe worldwide computing grid is essential to the LHC experiments in analysing ...
Dans ce rapport nous décrivons la façon de réaliser une tâche particulière de positionnement par ass...
Les techniques issues du traitement automatique des langues (TAL) permettent de mettre au jour des i...
An algorithm for finding small-weight words in large linear codes is developed. It is in particular ...
Deadlock detection is an interesting problem in MultiDataBase Systems (MDBS), since if all local tra...
Most computer programs store elements of a given nature into container-based data structures such as...
This paper is dedicated to a new binomial lattice method (MSM) consistent with the Black-Scholes mod...
A mixed variational-smoothing data assimilation method is derived under the perfect-model hypothesis...
This paper defines a new framework for fast prototyping of static analyzers based on rewriting techn...
In this report, we propose a number of new ways of detecting activations in fMRI sequences that requ...
The aim of this article is to present some new stability sufficient conditions for discrete-time non...
This paper investigates structural properties of occurrence (Petri) nets and their interpretation as...
Herein, we propose a local registration method for cartographic road networks on SPOT satellite imag...
A control strategy for tracking an omnidirectional target with a unicycle-like robot is proposed. An...
This paper presents a combination of verification and conformance testing techniques for the formal ...
International audienceThe worldwide computing grid is essential to the LHC experiments in analysing ...
Dans ce rapport nous décrivons la façon de réaliser une tâche particulière de positionnement par ass...
Les techniques issues du traitement automatique des langues (TAL) permettent de mettre au jour des i...
An algorithm for finding small-weight words in large linear codes is developed. It is in particular ...
Deadlock detection is an interesting problem in MultiDataBase Systems (MDBS), since if all local tra...