Sciweavers

1458 search results - page 74 / 292
» Extended Term Rewriting Systems
Sort
View
RTA
2007
Springer
15 years 4 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
CC
2000
Springer
134views System Software» more  CC 2000»
14 years 9 months ago
Pipelined Java Virtual Machine Interpreters
The performance of a Java Virtual Machine (JVM) interpreter running on a very long instruction word (VLIW) processor can be improved by means of pipelining. While one bytecode is i...
Jan Hoogerbrugge, Lex Augusteijn
CONCUR
2004
Springer
15 years 3 months ago
Resource Control for Synchronous Cooperative Threads
We develop new methods to statically bound the resources needed for the execution of systems of concurrent, interactive threads. Our study is concerned with a synchronous model of ...
Roberto M. Amadio, Silvano Dal-Zilio
CADE
2009
Springer
15 years 4 months ago
SPASS Version 3.5
SPASS is an automated theorem prover for full first-order logic with equality and a number of non-classical logics. This system description provides an overview of our recent deve...
Christoph Weidenbach, Dilyana Dimova, Arnaud Fietz...
ISMVL
2010
IEEE
188views Hardware» more  ISMVL 2010»
15 years 2 months ago
MDGs Reduction Technique Based on the HOL Theorem Prover
—Multiway Decision Graphs (MDGs) subsume Binary Decision Diagrams (BDDs) and extend them by a first-order formulae suitable for model checking of data path circuits. In this pap...
Sa'ed Abed, Otmane Aït Mohamed