Sciweavers

FUIN
2007
99views more  FUIN 2007»
13 years 4 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek
FUIN
2007
236views more  FUIN 2007»
13 years 4 months ago
Predicate Introduction for Logics with Fixpoint Semantics. Part II: Autoepistemic Logic
Joost Vennekens, Johan Wittocx, Maarten Marië...
FUIN
2007
120views more  FUIN 2007»
13 years 4 months ago
Concurrent Turing Machines
We define Concurrent Turing Machines (CTMs) as Turing machines with Petri nets as finite control. This leads to machines with arbitrary many tape heads, thus subsuming any class ...
Berndt Farwer, Manfred Kudlek, Heiko Rölke
FUIN
2007
147views more  FUIN 2007»
13 years 4 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
FUIN
2007
109views more  FUIN 2007»
13 years 4 months ago
Unifying Framework for Rule Semantics: Application to Gene Expression Data
Abstract. The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional dependencies in databases. Their s...
Marie Agier, Jean-Marc Petit, Einoshin Suzuki
FUIN
2007
114views more  FUIN 2007»
13 years 4 months ago
Cellular Devices and Unary Languages
Devices of interconnected parallel acting sequential automata are investigated from a language theoretic point of view. Starting with the well-known result that each unary language...
Andreas Klein, Martin Kutrib
FUIN
2007
129views more  FUIN 2007»
13 years 4 months ago
Sound Isolation by Harmonic Peak Partition For Music Instrument Recognition
Abstract. Identification of music instruments in polyphonic sounds is difficult and challenging, especially where heterogeneous harmonic partials are overlapping with each other....
Xin Zhang, Zbigniew W. Ras
FUIN
2007
99views more  FUIN 2007»
13 years 4 months ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
FUIN
2007
108views more  FUIN 2007»
13 years 4 months ago
An Axiomatization of the Token Game Based on Petri Algebras
The firing rule of Petri nets relies on a residuation operation for the commutative monoid of natural numbers. We identify a class of residuated commutative monoids, called Petri ...
Eric Badouel, Jules Chenou, Goulven Guillou
FUIN
2007
75views more  FUIN 2007»
13 years 4 months ago
Monocultures and Homogeneous Environment in Eco-Grammar Systems
Alica Kelemenová, Michal Tupý