Sciweavers

655 search results - page 92 / 131
» Automata, Logic, and XML
Sort
View
CADE
2005
Springer
16 years 4 days ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
CALCO
2009
Springer
133views Mathematics» more  CALCO 2009»
15 years 6 months ago
Stone Duality and the Recognisable Languages over an Algebra
Abstract. This is a theoretical paper giving the extended Stone duality perspective on the recently discovered connection between duality theory as studied in non-classical logic a...
Mai Gehrke
TIME
2007
IEEE
15 years 6 months ago
A Symbolic Decision Procedure for Robust Safety of Timed Systems
We present a symbolic algorithm for deciding safety (reachability) of timed systems modelled as Timed Automata (TA), under the notion of robustness w.r.t. infinitesimal clock-drif...
Mani Swaminathan, Martin Fränzle
ISCAS
1999
IEEE
72views Hardware» more  ISCAS 1999»
15 years 4 months ago
Shape-based sequential machine analysis
In this paper, the problem of determining if a given sequential specification can be made to fit a predetermined set of shape constraints is explored. Shape constraints are constr...
A. Crews, F. Brewer
CP
2008
Springer
15 years 1 months ago
Semi-automatic Generation of CHR Solvers for Global Constraints
Constraint programming often involves global constraints, for which various custom filtering algorithms have been published. This work presents a semi-automatic generation of CHR s...
Frank Raiser