In this paper we characterize all the covers of x in terms of an easily computed normal form for x. The characterization theorem then gives rise to a simple recursive algorithm which computes all the covers of x in time \Theta(n). By avoiding unnecessary checks, this algorithm appears to execute more quickly than that given in [2]. Let x denote a string of length n = jxj 0; in particular, let ffl denote the empty string of zero length. For any nonempty string x, let k 1 be the greatest integer such that (1:1) x = (v..
AbstractThis paper presents two sequent calculi, requiring no clausal form for types, whose typable ...
In a linear differential algebraic equation with properly stated leading term, the involved derivati...
AbstractThis paper presents a functional programming language, based on Moggi's monadic metalanguage...
This thesis presents a design style for implementing communicating sequential processes (CSP) as qua...
We present a non-looping method to construct Kripke trees refuting the non-theorems of intuitionisti...
Let x denote a given nonempty string of length n = |x| ⩾ 1. A string u is a cover of x if and only i...
AbstractLast works in linear logic mark a trend that can be summarized as: studying of fragments of ...
Differential algebraic equations consisting of a constant coefficient linear part and a small nonlin...
We design new inference systems for total orderings by applying rewrite techniques to chaining calcu...
A program property is a predicate on programs. In this paper we explore program properties of the fo...
The Picard curves are genus three curves with a non trivial automorphism, which have been intensivel...
In this paper we determine the minimal number of yes-no queries needed to find an unknown integer be...
A recursive algorithm for generating the prefix and infix traversaCls of a binary tree is inverted t...
AbstractLet Q be a Girard quantale. In other words Q is a complete lattice which also has the struct...
Several descriptions of basically one transformation technique, viz. accumulation, are compared. The...
AbstractThis paper presents two sequent calculi, requiring no clausal form for types, whose typable ...
In a linear differential algebraic equation with properly stated leading term, the involved derivati...
AbstractThis paper presents a functional programming language, based on Moggi's monadic metalanguage...
This thesis presents a design style for implementing communicating sequential processes (CSP) as qua...
We present a non-looping method to construct Kripke trees refuting the non-theorems of intuitionisti...
Let x denote a given nonempty string of length n = |x| ⩾ 1. A string u is a cover of x if and only i...
AbstractLast works in linear logic mark a trend that can be summarized as: studying of fragments of ...
Differential algebraic equations consisting of a constant coefficient linear part and a small nonlin...
We design new inference systems for total orderings by applying rewrite techniques to chaining calcu...
A program property is a predicate on programs. In this paper we explore program properties of the fo...
The Picard curves are genus three curves with a non trivial automorphism, which have been intensivel...
In this paper we determine the minimal number of yes-no queries needed to find an unknown integer be...
A recursive algorithm for generating the prefix and infix traversaCls of a binary tree is inverted t...
AbstractLet Q be a Girard quantale. In other words Q is a complete lattice which also has the struct...
Several descriptions of basically one transformation technique, viz. accumulation, are compared. The...
AbstractThis paper presents two sequent calculi, requiring no clausal form for types, whose typable ...
In a linear differential algebraic equation with properly stated leading term, the involved derivati...
AbstractThis paper presents a functional programming language, based on Moggi's monadic metalanguage...