Sciweavers

882 search results - page 122 / 177
» A Taste of Rewrite Systems
Sort
View
RTA
2007
Springer
14 years 2 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
BIRTHDAY
2005
Springer
14 years 2 months ago
Graph Transformation with Variables
Abstract. Variables make rule-based systems more abstract and expressive, as witnessed by term rewriting systems and two-level grammars. In this paper we show that variables can be...
Berthold Hoffmann
COOPIS
2003
IEEE
14 years 2 months ago
Query Evaluation in Peer-to-Peer Networks of Taxonomy-Based Sources
We consider the problem of query evaluation in Peer-to-Peer (P2P) systems that support semantic-based retrieval services. We confine ourselves to the case where the peers employ t...
Yannis Tzitzikas, Carlo Meghini
SCAM
2002
IEEE
14 years 1 months ago
Parallel Support for Source Code Analysis and Modification
Tools that analyze and enhance large-scale software systems using symbolic reasoning are computationally expensive, and yet processors are cheap. We believe that enabling tools wi...
Ira D. Baxter
CDC
2009
IEEE
107views Control Systems» more  CDC 2009»
14 years 1 months ago
Learning approaches to the Witsenhausen counterexample from a view of potential games
— Since Witsenhausen put forward his remarkable counterexample in 1968, there have been many attempts to develop efficient methods for solving this non-convex functional optimiz...
Na Li, Jason R. Marden, Jeff S. Shamma