Sciweavers

63 search results - page 13 / 13
» Comparing Meseguer's Rewriting Logic with the Logic CRWL
Sort
View
RTA
2009
Springer
14 years 1 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
IDEAS
2010
IEEE
141views Database» more  IDEAS 2010»
13 years 5 months ago
Modeling synchronized time series
Abstract. We consider the class of applications that manage time series (TS) and propose a data model and a query language that let these applications manipulate TS data sets at a ...
Zoé Faget, Philippe Rigaux, David Gross-Amb...
CSCLP
2008
Springer
13 years 8 months ago
An Efficient Decision Procedure for Functional Decomposable Theories Based on Dual Constraints
Abstract. Over the last decade, first-order constraints have been efficiently used in the artificial intelligence world to model many kinds of complex problems such as: scheduling,...
Khalil Djelloul