Sciweavers

655 search results - page 92 / 131
» Automata, Logic, and XML
Sort
View
CADE
2005
Springer
15 years 10 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
CALCO
2009
Springer
133views Mathematics» more  CALCO 2009»
15 years 4 months ago
Stone Duality and the Recognisable Languages over an Algebra
Abstract. This is a theoretical paper giving the extended Stone duality perspective on the recently discovered connection between duality theory as studied in non-classical logic a...
Mai Gehrke
TIME
2007
IEEE
15 years 4 months ago
A Symbolic Decision Procedure for Robust Safety of Timed Systems
We present a symbolic algorithm for deciding safety (reachability) of timed systems modelled as Timed Automata (TA), under the notion of robustness w.r.t. infinitesimal clock-drif...
Mani Swaminathan, Martin Fränzle
ISCAS
1999
IEEE
72views Hardware» more  ISCAS 1999»
15 years 2 months ago
Shape-based sequential machine analysis
In this paper, the problem of determining if a given sequential specification can be made to fit a predetermined set of shape constraints is explored. Shape constraints are constr...
A. Crews, F. Brewer
CP
2008
Springer
14 years 11 months ago
Semi-automatic Generation of CHR Solvers for Global Constraints
Constraint programming often involves global constraints, for which various custom filtering algorithms have been published. This work presents a semi-automatic generation of CHR s...
Frank Raiser