메뉴 건너뛰기




Volumn 75, Issue 2, 2008, Pages 182-208

Tree automata with equality constraints modulo equational theories

Author keywords

Basic paramodulation; First order theorem proving; Splitting; Tree automata; Verification of infinite state systems

Indexed keywords

AUTOMATA THEORY; CONSTRAINT THEORY; TREES (MATHEMATICS); VERIFICATION;

EID: 40849086287     PISSN: 15678326     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jlap.2007.10.006     Document Type: Article
Times cited : (5)

References (26)
  • 1
    • 17644411480 scopus 로고    scopus 로고
    • M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001.
    • M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001.
  • 3
    • 85029633250 scopus 로고
    • Equality and disequality constraints on direct subterms in tree automata
    • 9th Symp. on Theoretical Aspects of Computer Science, STACS, Springer
    • Bogaert B., and Tison S. Equality and disequality constraints on direct subterms in tree automata. 9th Symp. on Theoretical Aspects of Computer Science, STACS. LNCS vol. 577 (1992), Springer
    • (1992) LNCS , vol.577
    • Bogaert, B.1    Tison, S.2
  • 4
    • 40849092114 scopus 로고    scopus 로고
    • J.A. Bull, D.J. Otway, The authentication protocol, Tech. Rep., Defence Research Agency, Malvern, UK, 1997.
    • J.A. Bull, D.J. Otway, The authentication protocol, Tech. Rep., Defence Research Agency, Malvern, UK, 1997.
  • 5
    • 85027401543 scopus 로고
    • Pumping, cleaning and symbolic constraints solving
    • 21st Int. Coll. on Automata, Languages and Programming, ICALP, Springer
    • Caron A.-C., Comon H., Coquidé J.-L., Dauchet M., and Jacquemard F. Pumping, cleaning and symbolic constraints solving. 21st Int. Coll. on Automata, Languages and Programming, ICALP. LNCS vol. 820 (1994), Springer
    • (1994) LNCS , vol.820
    • Caron, A.-C.1    Comon, H.2    Coquidé, J.-L.3    Dauchet, M.4    Jacquemard, F.5
  • 6
    • 40849090666 scopus 로고    scopus 로고
    • H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, M. Tommasi, Tree Automata Techniques and Applications, 1997, .
    • H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, M. Tommasi, Tree Automata Techniques and Applications, 1997, .
  • 8
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Denning D.E., and Sacco G.M. Timestamps in key distribution protocols. Commun. ACM (1981)
    • (1981) Commun. ACM
    • Denning, D.E.1    Sacco, G.M.2
  • 10
    • 0042902829 scopus 로고    scopus 로고
    • Set-based analysis for logic programming and tree automata
    • Static Analysis, 4th International Symposium, SAS. Hentenryck P.V. (Ed), Springer
    • Devienne P., Talbot J.-M., and Tison S. Set-based analysis for logic programming and tree automata. In: Hentenryck P.V. (Ed). Static Analysis, 4th International Symposium, SAS. Lecture Notes in Computer Science vol. 1302 (1997), Springer
    • (1997) Lecture Notes in Computer Science , vol.1302
    • Devienne, P.1    Talbot, J.-M.2    Tison, S.3
  • 11
    • 0026188229 scopus 로고    scopus 로고
    • T. Frühwirth, E. Shapiro, M. Vardi, E. Yardeni, Logic programs as types for logic programs, in: Proc. of the 6th IEEE Symposium on Logic in Computer Science, 1991.
    • T. Frühwirth, E. Shapiro, M. Vardi, E. Yardeni, Logic programs as types for logic programs, in: Proc. of the 6th IEEE Symposium on Logic in Computer Science, 1991.
  • 12
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • Proc. of 17th Int. Conf. on Automated Deduction, CADE, Springer
    • Genet T., and Klay F. Rewriting for cryptographic protocol verification. Proc. of 17th Int. Conf. on Automated Deduction, CADE. LNCS vol. 1831 (2000), Springer
    • (2000) LNCS , vol.1831
    • Genet, T.1    Klay, F.2
  • 14
    • 84958779634 scopus 로고    scopus 로고
    • Unification in extensions of shallow equational theories
    • 9th Int. Conf. on Rewriting Techniques and Applications, RTA, Springer
    • Jacquemard F., Meyer C., and Weidenbach C. Unification in extensions of shallow equational theories. 9th Int. Conf. on Rewriting Techniques and Applications, RTA. LNCS vol. 1379 (1998), Springer
    • (1998) LNCS , vol.1379
    • Jacquemard, F.1    Meyer, C.2    Weidenbach, C.3
  • 15
    • 33749583378 scopus 로고    scopus 로고
    • Tree automata with equality constraints modulo equational theories
    • Proceedings of 3rd International Joint Conference on Automated Reasoning, IJCAR. Furbach U., and Shankar N. (Eds), Springer, Seattle, WA
    • Jacquemard F., Rusinowitch M., and Vigneron L. Tree automata with equality constraints modulo equational theories. In: Furbach U., and Shankar N. (Eds). Proceedings of 3rd International Joint Conference on Automated Reasoning, IJCAR. Lecture Notes in Artificial Intelligence vol. 4130 (2006), Springer, Seattle, WA
    • (2006) Lecture Notes in Artificial Intelligence , vol.4130
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 16
    • 35048832860 scopus 로고    scopus 로고
    • Automata-based analysis of recursive cryptographic protocols
    • 21st Annual Symp. on Theoretical Aspects of Computer Science, STACS, Springer
    • Küsters R., and Wilke T. Automata-based analysis of recursive cryptographic protocols. 21st Annual Symp. on Theoretical Aspects of Computer Science, STACS. LNCS vol. 2996 (2004), Springer
    • (2004) LNCS , vol.2996
    • Küsters, R.1    Wilke, T.2
  • 17
    • 14044253469 scopus 로고    scopus 로고
    • On the relative soundness of the free algebra model for public key encryption
    • Lynch C., and Meadows C. On the relative soundness of the free algebra model for public key encryption. Electr. Notes Theor. Comput. Sci. 125 1 (2005) 43-54
    • (2005) Electr. Notes Theor. Comput. Sci. , vol.125 , Issue.1 , pp. 43-54
    • Lynch, C.1    Meadows, C.2
  • 18
    • 84958766164 scopus 로고    scopus 로고
    • Normalizable Horn Clauses, strongly recognizable relations, and Spi
    • Static Analysis, 9th Int. Symp., SAS, Springer
    • Nielson F., Riis Nielson H., and Seidl H. Normalizable Horn Clauses, strongly recognizable relations, and Spi. Static Analysis, 9th Int. Symp., SAS. LNCS vol. 2477 (2002), Springer
    • (2002) LNCS , vol.2477
    • Nielson, F.1    Riis Nielson, H.2    Seidl, H.3
  • 19
    • 0000872752 scopus 로고    scopus 로고
    • Paramodulation-based theorem proving
    • Elsevier Science and MIT Press (Chapter 7)
    • Nieuwenhuis R., and Rubio A. Paramodulation-based theorem proving. Handbook of Automated Reasoning vol. I (2001), Elsevier Science and MIT Press 371-443 (Chapter 7)
    • (2001) Handbook of Automated Reasoning , vol.I , pp. 371-443
    • Nieuwenhuis, R.1    Rubio, A.2
  • 20
    • 84947242793 scopus 로고    scopus 로고
    • Decidability and closure properties of equational tree languages
    • 13th Int. Conf. on Rewriting Techniques and Applications, RTA, Springer
    • Ohsaki H., and Takai T. Decidability and closure properties of equational tree languages. 13th Int. Conf. on Rewriting Techniques and Applications, RTA. LNCS vol. 2378 (2002), Springer
    • (2002) LNCS , vol.2378
    • Ohsaki, H.1    Takai, T.2
  • 22
    • 0028523063 scopus 로고
    • Haskell overloading is dexptime-complete
    • Seidl H. Haskell overloading is dexptime-complete. Inform. Process. Lett. 52 2 (1994) 57-60
    • (1994) Inform. Process. Lett. , vol.52 , Issue.2 , pp. 57-60
    • Seidl, H.1
  • 23
    • 84947263345 scopus 로고    scopus 로고
    • Layered transducing term rewriting system and its recognizability preserving property
    • Int. Conf. on Rewriting Techniques and Applications, RTA, Springer
    • Seki H., Takai T., Fujinaka Y., and Kaji Y. Layered transducing term rewriting system and its recognizability preserving property. Int. Conf. on Rewriting Techniques and Applications, RTA. LNCS vol. 2378 (2002), Springer
    • (2002) LNCS , vol.2378
    • Seki, H.1    Takai, T.2    Fujinaka, Y.3    Kaji, Y.4
  • 24
    • 40849143768 scopus 로고    scopus 로고
    • S. Tison, Tree automata and term rewrite systems, Invited Tutorial at the 11th Int. Conf. on Rewriting Techniques and Applications, RTA, 2000.
    • S. Tison, Tree automata and term rewrite systems, Invited Tutorial at the 11th Int. Conf. on Rewriting Techniques and Applications, RTA, 2000.
  • 25
    • 27344455431 scopus 로고    scopus 로고
    • Selecting theories and recursive protocols
    • CONCUR. Abadi M., and de Alfaro L. (Eds), Springer
    • Truderung T. Selecting theories and recursive protocols. In: Abadi M., and de Alfaro L. (Eds). CONCUR. Lecture Notes in Computer Science vol. 3653 (2005), Springer
    • (2005) Lecture Notes in Computer Science , vol.3653
    • Truderung, T.1
  • 26
    • 40849132462 scopus 로고    scopus 로고
    • K.N. Verma, Two-way equational tree automata, Ph.D. thesis, ENS Cachan, September 2003.
    • K.N. Verma, Two-way equational tree automata, Ph.D. thesis, ENS Cachan, September 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.