Logic Programming '86


Book Description

This volume contains the papers presented, and subsequently submitted for publication, at the 5th Logic Programming Conference, held June 23-26, 1986 in Tokyo. Topics covered include Prolog machine architecture, Prolog processors, variations of Prolog language, and applications of Prolog to natural language understanding, and expert systems. Most of the works reported in the volume are related to the Japanese Fifth Generation Computer Project allowing readers to compare results from this project with those from similar projects currently being conducted in other countries.




Logic Programming '87


Book Description

This volume contains most of the papers presented at the 6th Logic Programming Conference held in Tokyo, June 22-24, 1987. It is the successor of Lecture Notes in Computer Science volumes 221 and 264. The contents cover foundations, programming, architecture and applications. Topics of particular interest are constraint logic programming and parallelism. The effort to apply logic programming to large-scale realistic problems is another important subject of these proceedings.




Logic Programming and Databases


Book Description

The topic of logic programming and databases. has gained in creasing interest in recent years. Several events have marked the rapid evolution of this field: the selection, by the Japanese Fifth Generation Project, of Prolog and of the relational data model as the basis for the development of new machine archi tectures; the focusing of research in database theory on logic queries and on recursive query processing; and the pragmatic, application-oriented development of expert database systems and of knowledge-base systems. As a result, an enormous amount of work has been produced in the recent literature, coupled with the spontaneous growth of several advanced projects in this area. The goal of this book is to present a systematic overview of a rapidly evolving discipline, which is presently not described with the same approach in other books. We intend to introduce stu dents and researchers to this new discipline; thus we use a plain, tutorial style, and complement the description of algorithms with examples and exercises. We attempt to achieve a balance be tween theoretical foundations and technological issues; thus we present a careful introduction to the new language Datalog, but we also focus on the efficient interfacing of logic programming formalisms (such as Prolog and Datalog) with large databases.




Logic Colloquium '86


Book Description

The result of the European Summer Meeting of the Association for Symbolic Logic, this volume gives an overview of the latest developments in most of the major fields of logic being actively pursued today. Important new developments in the applications of logic in computer science are presented. Other areas examined include model theory, set theory, recursion theory, proof theory, and the history of logic.This volume contains the texts of ten of the invited lectures and six of the contributed papers.




Foundations of Logic and Functional Programming


Book Description

This volume consists of some of the papers that were delivered during the workshop on "Foundations of Logic and Functional Programming" held in Trento, Italy, from December 15th to 19th, 1986. The meeting centered on themes and trends in Functional Programming and in Logic Programming. This book contains five papers contributed by the invited speakers and five selected contributions.




A 25-Year Perspective on Logic Programming


Book Description

This book celebratesthe 25th anniversaryof GULP—the Italian Associationfor LogicProgramming.Authored by Italian researchersat the leading edge of their ?elds, it presents an up-to-date survey of a broad collection of topics in logic programming, making it a useful reference for both researchers and students. During its 25-year existence, GULP has organised a wide range of national and international activities, including both conferences and summer schools. It has been especially active in supporting and encouraging young researchers, by providing scholarships for GULP events and awarding distinguished disser- tions. WeintheinternationallogicprogrammingcommunitylookuponGULPwith a combination of envy, admiration and gratitude. We are pleased to attend its conferences and summer schools, where we can learn about scienti?c advances, catch up with old friends and meet young students. It is an honour for me to acknowledge our appreciation to GULP for its outstanding contributions to our ?eld and to express our best wishes for its continuing prosperity in the future. March 2010 Robert Kowalski Imperial College London Preface On June 18, 1985, a group of pioneering researchers, including representatives from industry, national research labs, and academia, attended the constituent assembly of the Group of researchers and Users of Logic Programming (GULP) association. That was the starting point of a long adventure in science, that 1 we are still experiencing 25 years later. This volume celebrates this important event.




Attribute Grammars


Book Description

This book treats the problem of formulating models in mathematical programming, and thereafter solving the resulting model. Particular emphasis is placed on the interaction between the two. The topic is viewed from different angles, namely linear programming (Walter Murray), integer programming (Ellis Johnson), network flows (John Mulvey), and stochastic programming (Roger J-B Wets). The book will be very useful for any mathematics programmer or operations researcher who works in the field of real-world modelling. The book is an important part of any university course in modelling, particularly in operations research, economics and business. The book also contains an article on the origins of mathematical programming (Alexander Rinnooy Kan). This is important reading for anyone interested in the history of the field.




Compositionality, Concurrency, and Partial Correctness


Book Description

The hierarchical decomposition of programs into smaller ones is generally considered imperative to master the complexity of large programs. The impact of this principle of program decomposition on the specification and verification of parallel executed programs is the subject of this monograph. Two important yardsticks for verification methods, those of compositionality and modularity, are made precise. The problem of reusing software is addressed by the introduction of the notion of specification adaptation. Within this context, different methods for specifying the observable behavior with respect to partial correctness of communicating processes are considered, and in particular the contrast between the "programs are predicates" and the "programs are predicate transformers" paradigms is shown. The associated formal proof systems are proven sound and complete in various senses with respect to the denotational semantics of the programming language, and they are related to each other to give an in-depth comparison between the different styles of program verification. The programming language TNP used here is near to actual languages like Occam. It combines CCS/CSP style communication based programming with state based programming, and allows dynamically expanding and shrinking networks of processes.




Information and Communications Security


Book Description

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.




ESOP '88


Book Description

The volume contains the 23 papers selected for presentation at the ESOP '88 Conference, Nancy 1988. The theme of the ESOP conferences is the design, specification and implementation of programming languages and systems. Particular emphasis is placed on work in which an implemented system embodies an important concept or formal model of programming in such a way that its usefulness is demonstrated. Among the five sections of the volume, the one on language implementation contains the most papers. Here a rather wide spectrum of aspects, ranging from language implementation problems on parallel architectures and optimization of functional programs to new concepts for programming environments is covered. Another large section consists of papers in the area of algebraic specification and type concepts. The papers in this section are devoted to issues such as polymorphism, subtypes and notions of implementation and reuse for algebraic specifications. Two further sections are devoted to new language concepts and novel approaches to program development and verification.