Sciweavers

254 search results - page 32 / 51
» Restarting Tree Automata
Sort
View
CADE
2005
Springer
14 years 9 months ago
Regular Protocols and Attacks with Regular Knowledge
We prove that, if the initial knowledge of the intruder is given by a deterministic bottom-up tree automaton, then the insecurity problem for cryptographic protocols with atomic ke...
Tomasz Truderung
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 3 months ago
Isomorphism of regular trees and words
The complexity of the isomorphism problem for regular trees, regular linear orders, and regular words is analyzed. A tree is regular if it is isomorphic to the prefix order on a r...
Markus Lohrey, Christian Mathissen
RTA
2000
Springer
14 years 12 days ago
Parallelism Constraints
Parallelism constraints are logical descriptions of trees. Parallelism constraints subsume dominance constraints and are equal in expressive power to context unification. Paralleli...
Katrin Erk, Joachim Niehren
LICS
1997
IEEE
14 years 11 days ago
Automata, Tableaus and a Reduction Theorem for Fixpoint Calculi in Arbitrary Complete Lattices
Fixpoint expressions built from functional signatures interpreted over arbitrary complete lattices are considered. A generic notionof automatonis defined and shown, by means of a ...
David Janin
FLAIRS
1998
13 years 10 months ago
Implementing Parser Metarules that Handle Speech Repairs and Other Disruptions
Mixed-initiative dialogs often contain interruptions in phrase structure such as repairs and backchannel responses. Phrase structure as traditionally de ned does not accommodate s...
Mark G. Core, Lenhart K. Schubert