Sciweavers

429 search results - page 69 / 86
» Theorem Proving Languages for Verification
Sort
View
SAS
1999
Springer
117views Formal Methods» more  SAS 1999»
14 years 1 months ago
Abstracting Cryptographic Protocols with Tree Automata
ing Cryptographic Protocols with Tree Automata David Monniaux http://www.di.ens.fr/%7Fmonniaux, Laboratoire d’Informatique, ´Ecole Normale Sup´erieure, 45 rue d’Ulm , 75230 P...
David Monniaux
ICFP
2009
ACM
14 years 9 months ago
A functional I/O system or, fun for freshman kids
Functional programming languages ought to play a central role in mathematics education for middle schools (age range: 10?14). After all, functional programming is a form of algebr...
Matthias Felleisen, Robert Bruce Findler, Matthew ...
TPHOL
2005
IEEE
14 years 2 months ago
Alpha-Structural Recursion and Induction
The nominal approach to abstract syntax deals with the issues of bound names and α-equivalence by considering constructions and properties that are invariant with respect to permu...
Andrew M. Pitts
CCS
2010
ACM
13 years 6 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
ATAL
2008
Springer
13 years 10 months ago
Synchronization protocols for reliable communication in fully distributed agent systems
In order to prevent misunderstandings within groups of interacting agents, it is necessary to ensure that the agents' beliefs regarding the overall state of the interaction a...
Hywel R. Dunn-Davies, Jim Cunningham, Shamimabi Pa...