Sciweavers

263 search results - page 31 / 53
» Rigid Tree Automata
Sort
View
CADE
2005
Springer
16 years 2 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
149
Voted
CORR
2011
Springer
162views Education» more  CORR 2011»
14 years 8 months ago
Isomorphism of regular trees and words
The complexity of the isomorphism problem for regular trees, regular linear orders, and regular words is analyzed. A tree is regular if it is isomorphic to the prefix order on a r...
Markus Lohrey, Christian Mathissen
106
Voted
CA
1999
IEEE
15 years 6 months ago
Real-Time Collision Detection for Virtual Surgery
We present a simple method for performing real-time collision detection in a virtual surgery environment. The method relies on the graphics hardware for testing the interpenetrati...
Jean-Christophe Lombardo, Marie-Paule Cani, Fabric...
128
Voted
RTA
2000
Springer
15 years 5 months ago
Parallelism Constraints
Parallelism constraints are logical descriptions of trees. Parallelism constraints subsume dominance constraints and are equal in expressive power to context unification. Paralleli...
Katrin Erk, Joachim Niehren
LICS
1997
IEEE
15 years 5 months ago
Automata, Tableaus and a Reduction Theorem for Fixpoint Calculi in Arbitrary Complete Lattices
Fixpoint expressions built from functional signatures interpreted over arbitrary complete lattices are considered. A generic notionof automatonis defined and shown, by means of a ...
David Janin