Sciweavers

200 search results - page 37 / 40
» Algebraic Operational Semantics and Occam
Sort
View
ESORICS
2003
Springer
15 years 3 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
LICS
2002
IEEE
15 years 3 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson
NMR
2004
Springer
15 years 3 months ago
A probabilistic approach to default reasoning
A logic is defined which in addition to propositional calculus contains several types of probabilistic operators which are applied only to propositional formulas. For every s ∈...
Miodrag Raskovic, Zoran Ognjanovic, Zoran Markovic
WWW
2004
ACM
15 years 11 months ago
Composite events for xml
Recently, active behavior has received attention in the XML field to automatically react to occurred events. Aside from proprietary approaches for enriching XML with active behavi...
Martin Bernauer, Gerti Kappel, Gerhard Kramler
EDBT
2002
ACM
145views Database» more  EDBT 2002»
15 years 10 months ago
Incremental Maintenance of Schema-Restructuring Views
An important issue in data integration is the integration of semantically equivalent but schematically heterogeneous data sources. Declarative mechanisms supporting powerful source...
Andreas Koeller, Elke A. Rundensteiner