Sciweavers

29 search results - page 1 / 6
» Tree Automata with Memory, Visibility and Structural Constra...
Sort
View
FOSSACS
2007
Springer
14 years 1 months ago
Tree Automata with Memory, Visibility and Structural Constraints
Tree automata with one memory have been introduced in
Hubert Comon-Lundh, Florent Jacquemard, Nicolas Pe...
CORR
2008
Springer
93views Education» more  CORR 2008»
13 years 7 months ago
Visibly Tree Automata with Memory and Constraints
Hubert Comon-Lundh, Florent Jacquemard, Nicolas Pe...
CADE
2008
Springer
14 years 7 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
IPL
2008
147views more  IPL 2008»
13 years 7 months ago
Streaming tree automata
Streaming validation and querying of XML documents are often based on automata for tree-like structures. We propose a new notion of streaming tree automata in order to unify the t...
Olivier Gauwin, Joachim Niehren, Yves Roos
ACTA
2010
191views more  ACTA 2010»
13 years 7 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar