Sciweavers

2432 search results - page 117 / 487
» Cryptographic logical relations
Sort
View
OWLED
2008
15 years 2 months ago
Conjunctive Query Answering in EL using a Database System
We study conjunctive query answering in the description logic EL, the core of the designated OWL2-EL profile of OWL2. In particular, we present an approach that allows the use of c...
Carsten Lutz, David Toman, Frank Wolter
92
Voted
ENTCS
2008
85views more  ENTCS 2008»
15 years 21 days ago
Formalising in Nominal Isabelle Crary's Completeness Proof for Equivalence Checking
In the book on Advanced Topics in Types and Programming Languages, Crary illustrates the reasoning technique of logical relations in a case study about equivalence checking. He pr...
Julien Narboux, Christian Urban
99
Voted
JSYML
2000
69views more  JSYML 2000»
15 years 12 days ago
Topological Elementary Equivalence of Closed Semi-Algebraic Sets in The Real Plane
We investigate topological properties of subsets S of the real plane, expressed by first-order logic sentences in the language of the reals augmented with a binary relation symbol...
Bart Kuijpers, Jan Paredaens, Jan Van den Bussche
109
Voted
EUSFLAT
2009
120views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
On M-Approximative Operators and M-Approximative Systems
Abstract-- The concept of an M-approximative system is introduced. Basic properties of the category of M-approximative systems and in a natural way defined morphisms between them a...
Alexander P. Sostak
ESOP
2004
Springer
15 years 6 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...