Sciweavers

1000 search results - page 187 / 200
» Nominal rewriting systems
Sort
View
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
13 years 7 months ago
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
e an abstraction of zero-knowledge protocols that is le to a fully mechanized analysis. The abstraction is formalized within the applied pi-calculus using a novel equational theor...
Michael Backes, Matteo Maffei, Dominique Unruh
JOLLI
2010
106views more  JOLLI 2010»
13 years 7 months ago
Second-Order Abstract Categorial Grammars as Hyperedge Replacement Grammars
rder Abstract Categorial Grammars as Hyperedge Replacement Grammars Makoto Kanazawa National Institute of Informatics 2–1–2 Hitotsubashi, Chiyoda-ku, Tokyo, 101–8430, Japan A...
Makoto Kanazawa
GECCO
2009
Springer
174views Optimization» more  GECCO 2009»
13 years 6 months ago
Shape grammars and grammatical evolution for evolutionary design
We describe the first steps in the adoption of Shape Grammars with Grammatical Evolution for application in Evolutionary Design. Combining the concepts of Shape Grammars and Genet...
Michael O'Neill, John Mark Swafford, James McDermo...
ICOODB
2009
246views Database» more  ICOODB 2009»
13 years 6 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 3 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...