Μ-recursive function

Results: 22



#Item
1Recursive Session Types Revisited Ornela Dardha∗ School of Computing Science, University of Glasgow, UK   Session types model structured communication-based programming. In particular, binary

Recursive Session Types Revisited Ornela Dardha∗ School of Computing Science, University of Glasgow, UK Session types model structured communication-based programming. In particular, binary

Add to Reading List

Source URL: www.dcs.gla.ac.uk

Language: English - Date: 2014-07-25 10:12:01
2Lowness Properties and Approximations of the Jump Santiago Figueira ∗

Lowness Properties and Approximations of the Jump Santiago Figueira ∗

Add to Reading List

Source URL: www.glyc.dc.uba.ar

Language: English - Date: 2007-07-08 19:58:00
3Randomness and Universal Machines Santiago Figueira∗ Frank Stephan†  Guohua Wu‡

Randomness and Universal Machines Santiago Figueira∗ Frank Stephan† Guohua Wu‡

Add to Reading List

Source URL: www.glyc.dc.uba.ar

Language: English - Date: 2007-07-08 19:57:54
4Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3  Santiago Zanella1,3

Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3 Santiago Zanella1,3

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
5MUTUAL COOPERATION AND UNILATERAL ALTRUISM IN A ONE-SHOT PRISONER’S DILEMMA - A COMPUTABILITY APPROACH MIKIO NAKAYAMA Abstract. We consider the one-shot Prisoner’s Dilemma played by programs or machines, and show tha

MUTUAL COOPERATION AND UNILATERAL ALTRUISM IN A ONE-SHOT PRISONER’S DILEMMA - A COMPUTABILITY APPROACH MIKIO NAKAYAMA Abstract. We consider the one-shot Prisoner’s Dilemma played by programs or machines, and show tha

Add to Reading List

Source URL: ies.keio.ac.jp

Language: English - Date: 2015-05-07 04:10:57
6Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3  Santiago Zanella1,3

Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3 Santiago Zanella1,3

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
7Structural Recursion over Contextual Objects (Extended Abstract) Brigitte Pientka and Sherry Shanshan Ruan Andreas Abel

Structural Recursion over Contextual Objects (Extended Abstract) Brigitte Pientka and Sherry Shanshan Ruan Andreas Abel

Add to Reading List

Source URL: www2.tcs.ifi.lmu.de

Language: English - Date: 2014-01-20 17:12:51
8CHAIN LADDER CORRELATIONS  Greg Taylor Taylor Fry Consulting Actuaries Level 11, 55 Clarence Street Sydney NSW 2000

CHAIN LADDER CORRELATIONS Greg Taylor Taylor Fry Consulting Actuaries Level 11, 55 Clarence Street Sydney NSW 2000

Add to Reading List

Source URL: fbe.unimelb.edu.au

Language: English - Date: 2013-08-05 02:23:08
9Recursion Theory Frank Stephan October 8, 2012 Recursion theory deals with the fundamental concepts on what subsets of natural numbers (or other famous countable domains) could be defined effectively and how

Recursion Theory Frank Stephan October 8, 2012 Recursion theory deals with the fundamental concepts on what subsets of natural numbers (or other famous countable domains) could be defined effectively and how

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-10-08 00:46:12
10Notes from the logbook of a proof-checher’s project? Domenico Cantone1 , Eugenio G. Omodeo2 , Jacob T. Schwartz3 , Pietro Ursino1 1  3

Notes from the logbook of a proof-checher’s project? Domenico Cantone1 , Eugenio G. Omodeo2 , Jacob T. Schwartz3 , Pietro Ursino1 1 3

Add to Reading List

Source URL: www.multimedialibrary.com

Language: English - Date: 2014-03-05 10:47:18