Sciweavers

63 search results - page 13 / 13
» Comparing Meseguer's Rewriting Logic with the Logic CRWL
Sort
View
RTA
2009
Springer
15 years 8 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
IDEAS
2010
IEEE
141views Database» more  IDEAS 2010»
14 years 11 months ago
Modeling synchronized time series
Abstract. We consider the class of applications that manage time series (TS) and propose a data model and a query language that let these applications manipulate TS data sets at a ...
Zoé Faget, Philippe Rigaux, David Gross-Amb...
138
Voted
CSCLP
2008
Springer
15 years 3 months ago
An Efficient Decision Procedure for Functional Decomposable Theories Based on Dual Constraints
Abstract. Over the last decade, first-order constraints have been efficiently used in the artificial intelligence world to model many kinds of complex problems such as: scheduling,...
Khalil Djelloul