Sciweavers

41 search results - page 3 / 9
» Hierarchical combination of intruder theories
Sort
View
CCS
2008
ACM
13 years 7 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
JOLLI
2010
92views more  JOLLI 2010»
13 years 3 months ago
A Theory of Hierarchical Consequence and Conditionals
We introduce A-ranked preferential structures and combine them with an accessibility relation. A-ranked preferential structures are intermediate between simple preferential struct...
Dov M. Gabbay, Karl Schlechta
CADE
2006
Springer
13 years 9 months ago
Interpolation in Local Theory Extensions
In this paper we study interpolation in local extensions of a base theory. We identify situations in which it is possible to obtain interpolants in a hierarchical manner, by using ...
Viorica Sofronie-Stokkermans
TAGT
1998
Springer
184views Graph Theory» more  TAGT 1998»
13 years 9 months ago
A Framework for Adding Packages to Graph Transformation Approaches
Graphs are a commonly used formalism for modeling many different kinds of static and dynamic data. In many applications, data modeling can be improved by using hierarchically struc...
Giorgio Busatto, Gregor Engels, Katharina Mehner, ...
SMI
2005
IEEE
13 years 11 months ago
Maximizing Adaptivity in Hierarchical Topological Models
We present an approach to hierarchically encode the topology of functions over triangulated surfaces. We describe the topology of a function by its Morse-Smale complex, a well kno...
Peer-Timo Bremer, Valerio Pascucci, Bernd Hamann