<--- Back to Details
First PageDocument Content
Theoretical computer science / Lambda calculus / Inter-process communication / Software engineering / Mathematical logic / Combinatory logic / Logic in computer science / Futures and promises / Evaluation strategy / Evaluation / Monitor / Futures contract
Date: 2015-02-28 14:55:06
Theoretical computer science
Lambda calculus
Inter-process communication
Software engineering
Mathematical logic
Combinatory logic
Logic in computer science
Futures and promises
Evaluation strategy
Evaluation
Monitor
Futures contract

Contract Monitoring Semantics as Patterns of Communication Cameron Swords Amr Sabry Sam Tobin-Hochstadt

Add to Reading List

Source URL: homes.sice.indiana.edu

Download Document from Source Website

File Size: 357,48 KB

Share Document on Facebook

Similar Documents

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

A2J Evaluation and Research Options  Process Evaluation Formative Assessment

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document