On Closure under Complementation of Equational Tree Automata for Theories Extending AC
暂无分享,去创建一个
[1] Grzegorz Rozenberg,et al. Handbook of Formal Languages , 1997, Springer Berlin Heidelberg.
[2] Peter Y. A. Ryan,et al. An Attack on a Recursive Authentication Protocol. A Cautionary Tale , 1998, Inf. Process. Lett..
[3] Denis Lugiez. A Good Class of Tree Automata , 1998 .
[4] Hitoshi Ohsaki,et al. Beyond Regularity: Equational Tree Automata for Associative and Commutative Theories , 2001, CSL.
[5] Jean Goubault-Larrecq,et al. A Method for Automatic Cryptographic Protocol Verification , 2000, IPDPS Workshops.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Jean Goubault-Larrecq. A Method for Automatic Cryptographic Protocol Verification ( Extended , 2000 .
[8] Hubert Comon,et al. Tree automata techniques and applications , 1997 .
[9] Kumar Neeraj Verma,et al. Two-Way Equational Tree Automata for AC-Like Theories: Decidability and Closure Properties , 2003, RTA.
[10] Michael Hanus,et al. The Integration of Functions into Logic Programming: From Theory to Practice , 1994, J. Log. Program..
[11] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[12] Lawrence C. Paulson,et al. Mechanized proofs for a recursive authentication protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.
[13] Denis Lugiez,et al. Counting and Equality Constraints for Multitree Automata , 2003, FoSSaCS.
[14] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[15] Denis Lugiez,et al. A Good Class of Tree Automata and Application to Inductive Theorem Proving , 1998, ICALP.
[16] Ian Glendinning,et al. Parallel and Distributed Processing , 2001, Digital Image Analysis.
[17] Thomas Colcombet. Rewriting in the partial algebra of typed terms modulo AC , 2002, INFINITY.
[18] Moshe Y. Vardi. Reasoning about The Past with Two-Way Automata , 1998, ICALP.
[19] S. Ginsburg,et al. Semigroups, Presburger formulas, and languages. , 1966 .
[20] Alex K. Simpson,et al. Computational Adequacy in an Elementary Topos , 1998, CSL.
[21] David Monniaux. Abstracting cryptographic protocols with tree automata , 2003, Sci. Comput. Program..
[22] Toshinori Takai,et al. Decidability and Closure Properties of Equational Tree Languages , 2002, RTA.
[23] Ferenc Gécseg,et al. Tree Languages , 1997, Handbook of Formal Languages.