Search
Now showing items 1-10 of 20
Typechecking is Undecidable when 'Type' is a Type
(1989-12)
A function has a dependent type when the type of its result depends upon the value of its argument. The type of all types is the type of every type, including itself. In a typed l-calculus, these two features synergize ...
Impediments to Universal Preference-based Default Theories
(1989-10)
Research on nonmonotonic and default reasoning has identified several important criteria for preferring alternative default inferences. The theories of reasoning based on each of these criteria may uniformly be viewed as ...
Online Tracking of Mobile Users
(1989-08)
This paper deals with the problem of maintaining a distributed directory server, that enables us to keep track of mobile users in a distributed network. The paper introduces the graph-theoretic concept of regional matching, ...
A Study of Backoff Barrier Synchronization
(1989-06)
Shared-memory multiprocessors commonly use shared variables for synchronization. Simulations of real parallel applications show that large-scale cache-coherent multiprocessors suffer significant amounts of invalidation ...
Probabilistic Reasoning in the Domain of Genetic Counseling
(1989-10)
This paper describes a program, GENINFER, which uses belief networks to calculate risks of inheriting genetic disorders. GENINFER is based on Judea Pearl's [17] algorithm for fusion and propagation in probabilistic belief ...
ML with Extended Pattern Matching and Subtypes
(1989-08)
We extend a fragment of the programming language ML by incorporating a more general form of record pattern matching and providing for user-declared subtypes. Together, these two enhancements may be used to support a ...
Three Methods for Range Queries in Computational Geometry
(1989-03)
This paper surveys a variety of recent results addressing the problem of range queries in computational geometry. The major contribution of this paper is in identifying three general methods for range queries in computational ...
Workstation Services and Kerberos Authentication at Project Athena
(1989-03)
This document proposes solutions for two problems obstructing Project Athena's implementation of workstation services. The principal problem is that workstation services demand a more flexible mutual-authentication ...