Sciweavers

407 search results - page 45 / 82
» Malleable Proof Systems and Applications
Sort
View
LPNMR
2001
Springer
14 years 1 days ago
Bounded LTL Model Checking with Stable Models
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. As the model of asynchronous syst...
Keijo Heljanko, Ilkka Niemelä
FORMATS
2004
Springer
13 years 11 months ago
Decomposing Verification of Timed I/O Automata
This paper presents assume-guarantee style substitutivity results for the recently published timed I/O automaton modeling framework. These results are useful for decomposing verifi...
Dilsun Kirli Kaynar, Nancy A. Lynch
FCS
2006
13 years 9 months ago
Quantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it i...
Lelde Lace, Oksana Scegulnaja-Dubrovska, Ramuns Us...
IPL
2006
88views more  IPL 2006»
13 years 7 months ago
A note on the attractor-property of infinite-state Markov chains
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely oft...
Christel Baier, Nathalie Bertrand, Ph. Schnoebelen
LFCS
2007
Springer
14 years 1 months ago
Cut Elimination in Deduction Modulo by Abstract Completion
act Completion (Full Version) Guillaume Burel Claude Kirchner August 6, 2007 Deduction Modulo implements Poincar´e’s principle by identifying deduction and computation as diff...
Guillaume Burel, Claude Kirchner