Sciweavers

1894 search results - page 220 / 379
» A TLA Proof System
Sort
View
CCS
2003
ACM
15 years 9 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
ICTCS
2003
Springer
15 years 9 months ago
On the Computational Complexity of Cut-Elimination in Linear Logic
Abstract. Given two proofs in a logical system with a confluent cutelimination procedure, the cut-elimination problem (CEP) is to decide whether these proofs reduce to the same no...
Harry G. Mairson, Kazushige Terui
ECBS
2000
IEEE
97views Hardware» more  ECBS 2000»
15 years 9 months ago
Ensuring Structure and Behavior Correctness in Design Composition
The design of a large component-based software system typically involves the composition of different components. Instead of relying on a free composition of components, we advoca...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
ICFP
2000
ACM
15 years 9 months ago
The duality of computation
We review the close relationship between abstract machines for (call-by-name or call-by-value) λ-calculi (extended with Felleisen’s C) and sequent calculus, reintroducing on the...
Pierre-Louis Curien, Hugo Herbelin
CAV
2000
Springer
97views Hardware» more  CAV 2000»
15 years 9 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...