UNFOLDING RULES FOR GHC PROGRAMS

被引:4
|
作者
FURUKAWA, K
OKUMURA, A
MURAKAMI, M
机构
关键词
D O I
10.1007/BF03037135
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:143 / 157
页数:15
相关论文
共 50 条
  • [21] An Online Tool for Unfolding Symbolic Fuzzy Logic Programs
    Moreno, Gines
    Antonio Riaza, Jose
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, IWANN 2019, PT II, 2019, 11507 : 475 - 487
  • [22] Optimizing Fuzzy Logic Programs by Unfolding, Aggregation and Folding
    Guerrero, Juan Antonio
    Moreno, Gines
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 219 (0C) : 19 - 34
  • [23] UNFOLDING AND FIXPOINT SEMANTICS OF CONCURRENT CONSTRAINT LOGIC PROGRAMS
    GABBRIELLI, M
    LEVI, G
    THEORETICAL COMPUTER SCIENCE, 1992, 105 (01) : 85 - 128
  • [24] Unfolding-based Improvements on Fuzzy Logic Programs
    Julian, Pascual
    Moreno, Gines
    Penabad, Jaime
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 137 (01) : 69 - 103
  • [25] Reductions of Petri nets and unfolding of propositional logic programs
    Fribourg, L
    Olsen, H
    LOGIC PROGRAM SYNTHESIS AND TRANSFORMATION, 1997, 1207 : 187 - 203
  • [26] Lightweight Concurrency Primitives for GHC
    Li, Peng
    Marlow, Simon
    Jones, Simon Peyton
    Tolmach, Andrew
    HASKELL'07: PROCEEDINGS OF THE ACM SIGPLAN 2007 HASKELL WORKSHOP, 2007, : 107 - 118
  • [27] ALLOCATION RULES FOR MUSEUM PASS PROGRAMS
    Beal, Sylvain
    Solal, Philippe
    REVUE ECONOMIQUE, 2010, 61 (06): : 1099 - 1109
  • [28] Understanding of Loyalty Programs' Participation Rules
    de Lima, Lunie Imamura
    Steiner Neto, Pedro Jose
    RBGN-REVISTA BRASILEIRA DE GESTAO DE NEGOCIOS, 2013, 15 (49): : 489 - 503
  • [29] The Rules of Engagement for Bug Bounty Programs
    Laszka, Aron
    Zhao, Mingyi
    Malbari, Akash
    Grossklags, Jens
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 138 - 159
  • [30] Proof rules for the correctness of quantum programs
    Feng, Yuan
    Duan, Runyao
    Ji, Zhengfeng
    Ying, Mingsheng
    THEORETICAL COMPUTER SCIENCE, 2007, 386 (1-2) : 151 - 166