-
1
-
-
85029633250
-
Equality and disequality constraints on direct subterms in tree automata
-
In: Finkel, A., Jantzen, M. (eds.)
-
Bogaert, B., Tison, S.: Equality and Disequality Constraints on Direct Subterms in Tree Automata. In: Finkel, A., Jantzen, M. (eds.) STACS 1992. LNCS, Vol. 577, pp. 161-171. Springer, Heidelberg (1992)
-
(1992)
STACS 1992. LNCS
, vol.577
, pp. 161-171
-
-
Bogaert, B.1
Tison, S.2
-
2
-
-
0001288985
-
Automata for reduction properties solving
-
Dauchet, M., Caron, A.C., Coquidé, J.L.: Automata for Reduction Properties Solving. Journal of Symbolic Computation 20(2), 215-233 (1995)
-
(1995)
Journal of Symbolic Computation
, vol.20
, Issue.2
, pp. 215-233
-
-
Dauchet, M.1
Caron, A.C.2
Coquidé, J.L.3
-
3
-
-
15744388991
-
Tree automata with one memory set constraints and cryptographic protocols
-
DOI 10.1016/j.tcs.2004.09.036, PII S0304397504006723, Automata, Languages and Programming
-
Comon, H., Cortier, V.: Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Computer Science 331(1), 143-214 (2005) (Pubitemid 40415266)
-
(2005)
Theoretical Computer Science
, vol.331
, Issue.1
, pp. 143-214
-
-
Comon, H.1
Cortier, V.2
-
4
-
-
54249158025
-
Tree automata with global constraints
-
In: Ito, M., Toyama, M. (eds.)
-
Filiot, E., Talbot, J.M., Tison, S.: Tree automata with global constraints. In: Ito, M., Toyama, M. (eds.) DLT 2008. LNCS, Vol. 5257, pp. 314-326. Springer, Heidelberg (2008)
-
(2008)
DLT 2008. LNCS
, vol.5257
, pp. 314-326
-
-
Filiot, E.1
Talbot, J.M.2
Tison, S.3
-
5
-
-
24944536280
-
On computing reachability sets of process rewrite systems
-
Term Rewriting and Applications: 16th International Conference, RTA 2005, Proceedings
-
Bouajjani, A., Touili, T.: On computing reachability sets of process rewrite systems. In: Giesl, J. (ed.) RTA 2005. LNCS, Vol. 3467, pp. 484-499. Springer, Heidelberg (2005) (Pubitemid 41313377)
-
(2005)
Lecture Notes in Computer Science
, vol.3467
, pp. 484-499
-
-
Bouajjani, A.1
Touili, T.2
-
6
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
In: McAllester, D. (ed.) In: McAllester, D. (ed.)
-
Genet, T., Klay, F.: Rewriting for Cryptographic Protocol Verification. In: McAllester, D. (ed.) CADE 2000. LNCS, Vol. 1831. Springer, Heidelberg (2000)
-
(2000)
CADE 2000. LNCS
, vol.1831
-
-
Genet, T.1
Klay, F.2
-
7
-
-
17644411480
-
Mobile values, new names, and secure communication
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL, pp. 104-115(2001) (Pubitemid 33720332)
-
(2001)
SIGPLAN Notices (ACM Special Interest Group on Programming Languages)
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
8
-
-
40849086287
-
Tree automata with equality constraints modulo equational theories
-
Jacquemard, F., Rusinowitch, M., Vigneron, L.: Tree automata with equality constraints modulo equational theories. Journal of Logic and Algebraic Programming 75(2), 182-208 (2008)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.2
, pp. 182-208
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
10
-
-
38049035790
-
Satisfiability of a spatial logic with tree variables
-
In: Duparc, J., Henzinger, T.A. (eds.)
-
Filiot, E., Talbot, J.M., Tison, S.: Satisfiability of a spatial logic with tree variables. In: Duparc, J., Henzinger, T.A. (eds.) CSL 2007. LNCS, Vol. 4646, pp. 130-145. Springer, Heidelberg (2007)
-
(2007)
CSL 2007. LNCS
, vol.4646
, pp. 130-145
-
-
Filiot, E.1
Talbot, J.M.2
Tison, S.3
-
12
-
-
18444377894
-
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Closure properties and decision problems of dag automata. Inf. Process. Lett. 94(5), 231-240 (2005)
-
(2005)
Closure properties and decision problems of dag automata. Inf. Process. Lett.
, vol.94
, Issue.5
, pp. 231-240
-
-
Anantharaman, S.1
Narendran, P.2
Rusinowitch, M.3
-
13
-
-
0004060205
-
-
Comon, H., Dauchet, M., Gilleron, R., Jacquemard, F., Löding, C., Lugiez, D., Tison, S., Tommasi, M.: Tree Automata Techniques and Applications (2007), http://tata.gforge.inria.fr
-
(2007)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Löding, C.5
Lugiez, D.6
Tison, S.7
Tommasi, M.8
-
14
-
-
0028523063
-
Haskell overloading is DEXPTIME-complete
-
DOI 10.1016/0020-0190(94)00130-8
-
Seidl, H.: Haskell overloading is DEXPTIME-complete. Information Processing Letters 52(2), 57-60 (1994) (Pubitemid 124013221)
-
(1994)
Information Processing Letters
, vol.52
, Issue.2
, pp. 57-60
-
-
Seidl, H.1
-
15
-
-
4544311800
-
Visibly pushdown languages
-
ACM, New York
-
Alur, R., Madhusudan, P.: Visibly pushdown languages. In: 36th Annual ACM Symposium on Theory of Computing, STOC, pp. 202-211. ACM, New York (2004)
-
(2004)
36th Annual ACM Symposium on Theory of Computing, STOC
, pp. 202-211
-
-
Alur, R.1
Madhusudan, P.2
-
16
-
-
38049021499
-
Visibly pushdown languages and term rewriting
-
In: Konev, B., Wolter, F. (eds.)
-
Chabin, J., Réty, P.: Visibly pushdown languages and term rewriting. In: Konev, B., Wolter, F. (eds.) FroCos 2007. LNCS, Vol. 4720, pp. 252-266. Springer, Heidelberg (2007)
-
(2007)
FroCos 2007. LNCS
, vol.4720
, pp. 252-266
-
-
Chabin, J.1
Réty, P.2
-
17
-
-
37149055031
-
Tree automata with memory, visibility and structural constraints
-
Foundations of Software Science and Computational Structures - 10th International Conference, FOSSACS 2007. Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007
-
Comon-Lundh, H., Jacquemard, F., Perrin, N.: Tree automata with memory, visibility and structural constraints. In: Seidl, H. (ed.) FOSSACS 2007. LNCS, Vol. 4423, pp. 168-182. Springer, Heidelberg (2007) (Pubitemid 350259702)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4423
, pp. 168-182
-
-
Comon-Lundh, H.1
Jacquemard, F.2
Perrin, N.3
|