Sciweavers

5 search results - page 1 / 1
» Visibly Tree Automata with Memory and Constraints
Sort
View
FOSSACS
2007
Springer
13 years 11 months ago
Tree Automata with Memory, Visibility and Structural Constraints
Tree automata with one memory have been introduced in
Hubert Comon-Lundh, Florent Jacquemard, Nicolas Pe...
CORR
2008
Springer
93views Education» more  CORR 2008»
13 years 5 months ago
Visibly Tree Automata with Memory and Constraints
Hubert Comon-Lundh, Florent Jacquemard, Nicolas Pe...
CADE
2008
Springer
14 years 5 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
ACTA
2010
191views more  ACTA 2010»
13 years 5 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
IANDC
2011
129views more  IANDC 2011»
13 years 9 days ago
Rigid tree automata and applications
We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a res...
Florent Jacquemard, Francis Klay, Camille Vacher