Sciweavers

CADE
2011
Springer
12 years 5 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ORL
2011
12 years 7 months ago
A note on the MIR closure and basic relaxations of polyhedra
Anderson, Cornu´ejols and Li (2005) show that for a polyhedral mixed integer set defined by a constraint system
Sanjeeb Dash, Oktay Günlük, Christian Ra...
VL
2003
IEEE
141views Visual Languages» more  VL 2003»
13 years 10 months ago
A browsing interface for exploring constraints in visualization rules
We built a prototype tool for browsing constraint systems for the layout of graphical objects. It has two views: In one view, the tool visualizes a constraint system as a threedim...
Shin Takahashi
CSLP
2004
Springer
13 years 10 months ago
Gradience, Constructions and Constraint Systems
Abstract. This paper is concerned with the question of quantifying gradient degrees of acceptability by introducing the notion of Density in the context of constructional constrain...
Philippe Blache, Jean-Philippe Prost
CSCLP
2005
Springer
13 years 10 months ago
Complete Propagation Rules for Lexicographic Order Constraints over Arbitrary Domains
We give an efficiently executable specification of the global constraint of lexicographic order in the Constraint Handling Rules (CHR) language. In contrast to previous approaches...
Thom W. Frühwirth