Uniqueness of the distribution of zeroes of primitive level sequences over Z/(pe) (II) Fulltext Access 19 Pages 2007
Using Maude and Its Strategies for Defining a Framework for Analyzing Eden Semantics 1 Fulltext Access 19 Pages 2007
Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions Fulltext Access 19 Pages 2007
Code Generation for Parallel Applications Modelled with Object-Based Graph Grammars 1 Fulltext Access 19 Pages 2007
Language-Oriented Formal Analysis: a Case Study on Protocols and Distributed Systems Fulltext Access 19 Pages 2007
Parametric Performance Contracts: Non-Markovian Loop Modelling and an Experimental Evaluation Fulltext Access 19 Pages 2007
On the stability properties of linear dynamic time-varying unforced systems involving switches between parameterizations from topologic considerations via graph theory Fulltext Access 19 Pages 2007
An End-To-End Approach to Distributed Policy Language Implementation: (Extended Abstract) Fulltext Access 19 Pages 2007
Classification of the Computable Approximations by Divergence Boundings 1 Fulltext Access 20 Pages 2007
Cubic symmetric graphs of order a small number times a prime or a prime square Fulltext Access 20 Pages 2007
Classification of isosceles 7-point 3-distance sets in 3-dimensional Euclidean space Fulltext Access 20 Pages 2007
A combinatorial strongly subexponential strategy improvement algorithm for mean payoff games Fulltext Access 20 Pages 2007
On the parallel computation of the biconnected and strongly connected co-components of graphs Fulltext Access 20 Pages 2007
What You Lose is What You Leak: Information Leakage in Declassification Policies Fulltext Access 20 Pages 2007
A Methodological Approach to Choose Components in Development and Evolution Processes Fulltext Access 20 Pages 2007
Impact of Evolution of Concerns in the Model-Driven Architecture Design Approach Fulltext Access 20 Pages 2007
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags 1 Fulltext Access 20 Pages 2007
Functional Programming With Higher-order Abstract Syntax and Explicit Substitutions Fulltext Access 20 Pages 2007
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting 1 Fulltext Access 20 Pages 2007
Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption 1 Fulltext Access 21 Pages 2007
Language Primitives and Type Discipline for Structured Communication-Based Programming Revisited: Two Systems for Higher-Order Session Communication Fulltext Access 21 Pages 2007
Timed Concurrent Constraint Programming for Analysing Biological Systems Fulltext Access 21 Pages 2007
Transformation for Refining Unraveled Conditional Term Rewriting Systems Fulltext Access 21 Pages 2007