Sciweavers

LICS
1999
IEEE
13 years 9 months ago
Guarded Fixed Point Logic
Guarded fixed point logics are obtained by adding least and greatest fixed points to the guarded fragments of firstorder logic that were recently introduced by Andr
Erich Grädel, Igor Walukiewicz
LICS
1999
IEEE
13 years 9 months ago
A Superposition Decision Procedure for the Guarded Fragment with Equality
We give a new decision procedure for the guarded fragment with equality. The procedure is based on resolution with superposition. We argue that this method will be more useful in ...
Harald Ganzinger, Hans de Nivelle
LICS
1999
IEEE
13 years 9 months ago
A New Approach to Abstract Syntax Involving Binders
Murdoch Gabbay, Andrew M. Pitts
LICS
1999
IEEE
13 years 9 months ago
Some Decision Problems of Enormous Complexity
We present some new decision and comparison problems of unusually high computational complexity. Most of the problems are strictly combinatorial in nature; others involve basic lo...
Harvey Friedman
LICS
1999
IEEE
13 years 9 months ago
Abstract Syntax and Variable Binding
Syntax and Variable Binding d Abstract) Marcelo Fiore COGS Univ. of Sussex Gordon Plotkin LFCS Univ. of Edinburgh Daniele Turi LFCS Univ. of Edinburgh op a theory of abstract synt...
Marcelo P. Fiore, Gordon D. Plotkin, Daniele Turi
LICS
1999
IEEE
13 years 9 months ago
Weak Bisimulation and Open Maps
Marcelo P. Fiore, Gian Luca Cattani, Glynn Winskel
LICS
1999
IEEE
13 years 9 months ago
Full Completeness of the Multiplicative Linear Logic of Chu Spaces
We prove full completeness of multiplicative linear logic (MLL) without MIX under the Chu interpretation. In particular we show that the cut-free proofs of MLL theorems are in a n...
Harish Devarajan, Dominic J. D. Hughes, Gordon D. ...
LICS
1999
IEEE
13 years 9 months ago
Subtyping Recursive Types in Kernel Fun
The problem of defining and checking a subtype relation between recursive types was studied in [3] for a first order type system, but for second order systems, which combine subty...
Dario Colazzo, Giorgio Ghelli
LICS
1999
IEEE
13 years 9 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese