Sciweavers

2106 search results - page 383 / 422
» Operational Semantics for MSC'96
Sort
View
LICS
1999
IEEE
15 years 2 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
FSTTCS
1999
Springer
15 years 2 months ago
Hoare Logic for Mutual Recursion and Local Variables
We present a (the rst?) sound and relatively complete Hoare logic for a simple imperative programming language including mutually recursive procedures with call-by-value parameters...
David von Oheimb
AGP
1998
IEEE
15 years 2 months ago
Some Design Issues in the Visualization of Constraint Logic Program Execution
Visualization of program executions has been found useful in applications which include education and debugging. However, traditional visualization techniques often fall short of ...
Manuel Carro, Manuel V. Hermenegildo
IFM
1999
Springer
15 years 2 months ago
Retrenchment and Punctured Simulation
: Some of the shortcomings of using refinement alone as the means of passing from high level simple models to actual detailed implementations are reviewed. Retrenchment is presente...
Richard Banach, Michael Poppleton
POPL
1998
ACM
15 years 1 months ago
Higher-Order unCurrying
We present a formal specification of unCurrying for a higher-order, functional language with ML-style let-polymorphism. This specification supports the general unCurrying of func...
John Hannan, Patrick Hicks