Sciweavers

29 search results - page 1 / 6
» Tree Automata with Memory, Visibility and Structural Constra...
Sort
View
FOSSACS
2007
Springer
14 years 5 months ago
Tree Automata with Memory, Visibility and Structural Constraints
Tree automata with one memory have been introduced in
Hubert Comon-Lundh, Florent Jacquemard, Nicolas Pe...
CORR
2008
Springer
93views Education» more  CORR 2008»
13 years 11 months ago
Visibly Tree Automata with Memory and Constraints
Hubert Comon-Lundh, Florent Jacquemard, Nicolas Pe...
CADE
2008
Springer
14 years 11 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
IPL
2008
147views more  IPL 2008»
13 years 10 months ago
Streaming tree automata
Streaming validation and querying of XML documents are often based on automata for tree-like structures. We propose a new notion of streaming tree automata in order to unify the t...
Olivier Gauwin, Joachim Niehren, Yves Roos
ACTA
2010
191views more  ACTA 2010»
13 years 11 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar