Sciweavers

1888 search results - page 23 / 378
» Proof theory and computational analysis
Sort
View
CADE
2009
Springer
14 years 8 months ago
Computing Knowledge in Security Protocols under Convergent Equational Theories
In the symbolic analysis of security protocols, two classical notions of knowledge, deducibility and indistinguishability, yield corresponding decision problems. We propose a proce...
Stéphanie Delaune, Stefan Ciobâca, St...
COMPGEOM
2003
ACM
14 years 17 days ago
Molecular shape analysis based upon the morse-smale complex and the connolly function
Docking is the process by which two or several molecules form a complex. Docking involves the geometry of the molecular surfaces, as well as chemical and energetical consideration...
Frédéric Cazals, Frédé...
SMI
2005
IEEE
14 years 27 days ago
Computational Topology for Reconstruction of Surfaces with Boundary: Integrating Experiments and Theory
We report new techniques and theory in computational topology for reconstructing surfaces with boundary. This complements and extends known techniques for surfaces without boundar...
K. Abe, Justin Bisceglio, Thomas J. Peters, Alexan...
TAP
2008
Springer
153views Hardware» more  TAP 2008»
13 years 7 months ago
Bounded Relational Analysis of Free Data Types
Abstract. In this paper we report on our first experiences using the relational analysis provided by the Alloy tool with the theorem prover KIV in the context of specifications of ...
Andriy Dunets, Gerhard Schellhorn, Wolfgang Reif
FOSSACS
2010
Springer
14 years 2 months ago
Toward a Compositional Theory of Leftist Grammars and Transformations
Leftist grammars [Motwani et al., STOC 2000] are special semi-Thue systems where symbols can only insert or erase to their left. We develop a theory of leftist grammars seen as wor...
Pierre Chambart, Ph. Schnoebelen