Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
With the technical development of multi-electrode arrays, the monitoring of many individual neurons has become feasible. However, for practical use of those arrays as bidirectional...
Andreas Herzog, Karsten Kube, Bernd Michaelis, Ana...
Abstract. JProver is a first-order intuitionistic theorem prover that creates sequent-style proof objects and can serve as a proof engine in interactive proof assistants with expre...
Stephan Schmitt, Lori Lorigo, Christoph Kreitz, Al...
Synchronization performance is a major problem with intermittently connected mobile databases. A server periodically generates update files for each client, which are downloaded ...
We present an automated proof method for constructive logic based on Wallen’s matrix characterization for intuitionistic validity. The proof search strategy extends Bibel’s con...