This paper considers interrelations between universal algebra, algebraic logic, geometry and computer science. The key idea of the paper is to show that problems, coming from computer science, require introducing of highly non-trivial ...
Trojan horse, Spyware, Trap Door and Logic Bomb. Here we group together those malware that do not exhibit an infection behavior. A Trojan horse is a non-replicating program that hides its malicious intent inside host programs that may ...
Janicki, R.: Relational Structures Model of Concurrency. Acta Informatica 45(4), 279–320 (2008) 10. Janicki, R., Koutny, M.: Invariants and Paradigms of Concurrency Theory. In: Aarts, E.H.L., van Leeuwen, J., Rem, M. (eds.) PARLE 1991.
... label 1 and the root of 7 + 1 are ' gummed ' together at their roots . Note that red ( ) = • 1 . In the case ( A2 ) , the extended binary tree Thin appearing in TЄB [ AMOK ] has more than one node ( i.e. || T || ut > 1 ) . Here , T ; Є ...
Fundamentals of Computation Theory: Proceedings of the 1981 International FCT-Conference, Szeged, Hungaria, August 24-28, 1981
... problems on the Boolean domain and characterized the computational complexity of such problems. We investigate an ... solutions in the Boolean domain, but have solutions via operator assignments on some finite-dimensional Hilbert space ...