-
2
-
-
0001285877
-
Basic paramodulation
-
L. Bachmair, H. Ganzinger, C. Lynch, and W. Snyder. Basic Paramodulation. Information and Computation, 121(2):172-192, 1995.
-
(1995)
Information and Computation
, vol.121
, Issue.2
, pp. 172-192
-
-
Bachmair, L.1
Ganzinger, H.2
Lynch, C.3
Snyder, W.4
-
3
-
-
85029633250
-
Equality and disequality constraints on direct subterms in tree automata
-
9th Symp. on Theoretical Aspects of Computer Science, STAGS. Springer
-
B. Bogaert and S. Tison. Equality and Disequality Constraints on Direct Subterms in Tree Automata. In 9th Symp. on Theoretical Aspects of Computer Science, STAGS, volume 577 of LNCS, pages 161-171. Springer, 1992.
-
(1992)
LNCS
, vol.577
, pp. 161-171
-
-
Bogaert, B.1
Tison, S.2
-
4
-
-
14044264137
-
The authentication protocol
-
Defence Research Agency, Malvern, UK
-
J. A. Bull and D. J. Otway. The authentication protocol. Technical report, Defence Research Agency, Malvern, UK, 1997.
-
(1997)
Technical Report
-
-
Bull, J.A.1
Otway, D.J.2
-
5
-
-
85027401543
-
Pumping, cleaning and symbolic constraints solving
-
21st Int. Coll. on Automata, Languages and Programming, ICALP. Springer
-
A.-C. Caron, H. Comon, J.-L. Coquidé, M. Dauchet, and F. Jacquemard. Pumping, Cleaning and Symbolic Constraints Solving. In 21st Int. Coll. on Automata, Languages and Programming, ICALP, volume 820 of LNCS, pages 436-449. Springer, 1994.
-
(1994)
LNCS
, vol.820
, pp. 436-449
-
-
Caron, A.-C.1
Comon, H.2
Coquidé, J.-L.3
Dauchet, M.4
Jacquemard, F.5
-
6
-
-
0004060205
-
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications. http://www.grappa. univ-lille3.fr/tata, 1997.
-
(1997)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
7
-
-
0001288985
-
Automata for reduction properties solving
-
M. Dauchet, A.-C. Caron, and J.-L. Coquidé. Automata for Reduction Properties Solving. Journal of Symbolic Computation, 20(2):215-233, 1995.
-
(1995)
Journal of Symbolic Computation
, vol.20
, Issue.2
, pp. 215-233
-
-
Dauchet, M.1
Caron, A.-C.2
Coquidé, J.-L.3
-
10
-
-
0042902829
-
Set-based analysis for logic programming and tree automata
-
P. V, Hentenryck, editor, Static Analysis, 4th International Symposium, SAS. Springer
-
P. Devienne, J.-M. Talbot, and S. Tison. Set-based analysis for logic programming and tree automata. In P. V, Hentenryck, editor, Static Analysis, 4th International Symposium, SAS, volume 1302 of Lecture Notes in Computer Science, pages 127-140. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1302
, pp. 127-140
-
-
Devienne, P.1
Talbot, J.-M.2
Tison, S.3
-
11
-
-
0026188229
-
Logic programs as types for logic programs
-
T. Frühwirth, E. Shapiro, M. Vardi, and E. Yardeni. Logic programs as types for logic programs. In Proc. of the 6th IEEE Symposium on Logic in Computer Science, pages 300-309, 1991.
-
(1991)
Proc. of the 6th IEEE Symposium on Logic in Computer Science
, pp. 300-309
-
-
Frühwirth, T.1
Shapiro, E.2
Vardi, M.3
Yardeni, E.4
-
12
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
Proc. of 17th Int. Conf. on Automated Deduction, CADE. Springer
-
T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification. In Proc. of 17th Int. Conf. on Automated Deduction, CADE, volume 1831 of LNCS. Springer, 2000.
-
(2000)
LNCS
, vol.1831
-
-
Genet, T.1
Klay, F.2
-
14
-
-
84958779634
-
Unification in extensions of shallow equational theories
-
9th Int. Conf. on Rewriting Techniques and Applications, RTA. Springer
-
F. Jacquemard, C. Meyer, and C. Weidenbach. Unification in Extensions of Shallow Equational Theories. In 9th Int. Conf. on Rewriting Techniques and Applications, RTA, volume 1379 of LNCS, pages 76-90. Springer, 1998.
-
(1998)
LNCS
, vol.1379
, pp. 76-90
-
-
Jacquemard, F.1
Meyer, C.2
Weidenbach, C.3
-
15
-
-
33749543951
-
Tree automata with equality constraints modulo equational theories
-
LSV
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Tree automata with equality constraints modulo equational theories. Technical Report LSV-06-07, LSV, 2006. http://www.lsv.ens-cachan.fr/Publis.
-
(2006)
Technical Report
, vol.LSV-06-07
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
16
-
-
35048832860
-
Automata-based analysis of recursive cryptographic protocols
-
21st Annual Symp. on Theoretical Aspects of Computer Science, STAGS. Springer
-
R. Küsters and T. Wilke. Automata-Based Analysis of Recursive Cryptographic Protocols. In 21st Annual Symp. on Theoretical Aspects of Computer Science, STAGS, volume 2996 of LNCS, pages 382-393. Springer, 2004.
-
(2004)
LNCS
, vol.2996
, pp. 382-393
-
-
Küsters, R.1
Wilke, T.2
-
17
-
-
14044253469
-
On the relative soundness of the free algebra model for public key encryption
-
C. Lynch and C. Meadows. On the relative soundness of the free algebra model for public key encryption. Electr. Notes Theor. Comput. Sci., 125(1):43-54, 2005.
-
(2005)
Electr. Notes Theor. Comput. Sci.
, vol.125
, Issue.1
, pp. 43-54
-
-
Lynch, C.1
Meadows, C.2
-
18
-
-
84958766164
-
Norrnalizable horn clauses, strongly recognizable relations, and spi
-
Static Analysis, 9th Int. Syrnp., SAS. Springer
-
F. Nielson, H. Riis Nielson, and H. Seidl. Norrnalizable Horn Clauses, Strongly Recognizable Relations, and Spi. In Static Analysis, 9th Int. Syrnp., SAS, volume 2477 of LNCS, pages 20-35. Springer, 2002.
-
(2002)
LNCS
, vol.2477
, pp. 20-35
-
-
Nielson, F.1
Nielson, H.R.2
Seidl, H.3
-
19
-
-
0000872752
-
Pararnodulation-based theorem proving
-
chapter, Chapter 7. Elsevier Science and MIT Press
-
R. Nieuwenhuis and A. Rubio. Pararnodulation-Based Theorem Proving, chapter Handbook of Automated Reasoning, Volume I, Chapter 7. Elsevier Science and MIT Press, 2001.
-
(2001)
Handbook of Automated Reasoning
, vol.1
-
-
Nieuwenhuis, R.1
Rubio, A.2
-
20
-
-
84947242793
-
Decidability and closure properties of equational tree languages
-
13th Int. Conf. on Rewriting Techniques and Applications, RTA. Springer
-
H. Ohsaki and T. Takai. Decidability and Closure Properties of Equational Tree Languages. In 13th Int. Conf. on Rewriting Techniques and Applications, RTA, volume 2378 of LNCS, pages 114-128. Springer, 2002.
-
(2002)
LNCS
, vol.2378
, pp. 114-128
-
-
Ohsaki, H.1
Takai, T.2
-
22
-
-
84947263345
-
Layered transducing term rewriting system and its recognizability preserving property
-
Int. Conf. on Rewriting Techniques and Applications, RTA. Springer
-
H. Seki, T. Takai, Y. Fujinaka, and Y. Kaji. Layered Transducing Term Rewriting System and Its Recognizability Preserving Property. In Int. Conf. on Rewriting Techniques and Applications, RTA, volume 2378 of LNCS, pages 98-113. Springer, 2002.
-
(2002)
LNCS
, vol.2378
, pp. 98-113
-
-
Seki, H.1
Takai, T.2
Fujinaka, Y.3
Kaji, Y.4
-
24
-
-
27344455431
-
Selecting theories and recursive protocols
-
M. Abadi and L. de Alfaro, editors, CONCUR. Springer
-
T. Truderung. Selecting theories and recursive protocols. In M. Abadi and L. de Alfaro, editors, CONCUR, volume 3653 of Lecture Notes in Computer Science, pages 217-232. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3653
, pp. 217-232
-
-
Truderung, T.1
|