Sciweavers

5499 search results - page 151 / 1100
» Generalized Rewrite Theories
Sort
View
IANDC
2008
150views more  IANDC 2008»
15 years 4 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
131
Voted
CORR
2004
Springer
100views Education» more  CORR 2004»
15 years 4 months ago
On the Theory of Structural Subtyping
We show that the first-order theory of structural subtyping of non-recursive types is decidable. Let be a language consisting of function symbols (representing type constructors)...
Viktor Kuncak, Martin C. Rinard
EPIA
2005
Springer
15 years 10 months ago
Reducing Propositional Theories in Equilibrium Logic to Logic Programs
The paper studies reductions of propositional theories in equilibrium logic to logic programs under answer set semantics. Specifically we are concerned with the question of how to...
Pedro Cabalar, David Pearce, Agustín Valver...
JITECH
2008
117views more  JITECH 2008»
15 years 4 months ago
Towards a theory of organizational information services
: The use of information technology (IT) in organizations has undergone dramatic changes the past 30 years. As a result, it has become increasingly common to adopt a services rathe...
Lars Mathiassen, Carsten Sørensen
EMSOFT
2008
Springer
15 years 6 months ago
Interface theories with component reuse
Interface theories have been proposed to support incremental design and independent implementability. Incremental design means that the compatibility checking of interfaces can pr...
Laurent Doyen, Thomas A. Henzinger, Barbara Jobstm...