Sciweavers

1788 search results - page 149 / 358
» Model Theory for Process Algebra
Sort
View
116
Voted
ICNP
2007
IEEE
15 years 10 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
120
Voted
CTCS
1997
Springer
15 years 7 months ago
Monads and Modular Term Rewriting
Monads can be used to model term rewriting systems by generalising the well-known equivalence between universal algebra and monads on the category Set. In [L¨u96], this semantics ...
Christoph Lüth, Neil Ghani
109
Voted
CONCUR
1993
Springer
15 years 7 months ago
Modular Completeness for Communication Closed Layers
The Communication Closed Layers law is shown to be modular complete for a model related to that of Mazurkiewicz. It is shown that in a modular style of program development the CCL...
Maarten M. Fokkinga, Mannes Poel, Job Zwiers
132
Voted
CASC
2006
Springer
106views Mathematics» more  CASC 2006»
15 years 7 months ago
Simplicial Perturbation Techniques and Effective Homology
In this paper, we deal with the problem of the computation of the homology of a finite simplicial complex after an "elementary simplicial perturbation" process such as th...
Rocío González-Díaz, Bel&eacu...
WOTUG
2008
15 years 5 months ago
Mechanical Verification of a Two-Way Sliding Window Protocol
Abstract. We prove the correctness of a two-way sliding window protocol with piggybacking, where the acknowledgments of the latest received data are attached to the next data trans...
Bahareh Badban, Wan Fokkink, Jaco van de Pol