Publications : 2005

[BCM05]
P. Bouyer, F. Chevalier, and N. Markey. On the Expressiveness of TPTL and MTL. In Proceedings of the 25th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'05), volume 3821 of Lecture Notes in Computer Science, pages 432--443, Hyderabad, India, December 2005. Springer.
doi: 10.1007/11590156_35.
BibTex | DOI | Web page | PS | PDF ]
[Gas05a]
R. Gascon. Verifying qualitative and quantitative properties with LTL over concrete domains. In Proceedings of the 4th Workshop on Methods for Modalities (M4M-4), volume 194 of Informatik Bericht, pages 54--61, Berlin, Germany, December 2005. Humboldt Universität zu Berlin.
BibTex | Web page | PS | PDF ]
[Lar05b]
F. Laroussinie. Timed modal logics for the verification of real-time systems. In Proceedings of the 4th Workshop on Methods for Modalities (M4M-4), volume 194 of Informatik Bericht, pages 293--305, Berlin, Germany, December 2005. Humboldt Universität zu Berlin.
BibTex | Web page | PS | PDF ]
[KLT05]
S. Kremer, Y. Lakhnech, and R. Treinen. The Prouvé Manual: Specifications, Semantics, and Logics. Technical Report 7, projet RNTL PROUVÉ, December 2005. 49 pages.
BibTex | Web page | PS | PDF ]
[PR05b]
S. Pinchinat and S. Riedweg. On the Architectures in Decentralized Supervisory Control. In Proceedings of the 44th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC'05), pages 12--17, Seville, Spain, December 2005. IEEE Control System Society.
BibTex | Web page | PS | PDF ]
[Bac05]
M. Baclet. Applications du model-checking à des problèmes de vérification de systèmes sur puce. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2005.
BibTex | Web page | PDF ]
[Lar05a]
F. Laroussinie. Model checking temporisé --- Algorithmes efficaces et complexité. Mémoire d'habilitation, Université Paris 7, Paris, France, December 2005.
BibTex | Web page | PDF ]
[ABRS05]
P. A. Abdulla, N. Bertrand, A. Rabinovich, and Ph. Schnoebelen. Verification of Probabilistic Systems with Faulty Communication. Information and Computation, 202(2):141--165, November 2005.
doi: 10.1016/j.ic.2005.05.008.
BibTex | DOI | Web page | PS | PDF ]
[Bau05]
M. Baudet. Deciding Security of Protocols against Off-line Guessing Attacks. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), pages 16--25, Alexandria, Virginia, USA, November 2005. ACM Press.
doi: 10.1145/1102120.1102125.
BibTex | DOI | Web page | PS | PDF ]
[Gas05b]
P. Gastin. On the synthesis of distributed controllers. Invited talk, Workshop Perspectives in Verification, in honor of Wolfgang Thomas on the occasion of his Doctorate Honoris Causa, Cachan, France, November 2005.
BibTex ]
[BLR05]
P. Bouyer, F. Laroussinie, and P.-A. Reynier. Diagonal Constraints in Timed Automata: Forward Analysis of Timed Systems. In Proceedings of the 3rd International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'05), volume 3829 of Lecture Notes in Computer Science, pages 112--126, Uppsala, Sweden, November 2005. Springer.
doi: 10.1007/11603009_10.
BibTex | DOI | Web page | PS | PDF ]
[CF05]
G. Cécé and A. Finkel. Verification of Programs with Half-Duplex Communication. Information and Computation, 202(2):166--190, November 2005.
doi: 10.1016/j.ic.2005.05.006.
BibTex | DOI | Web page | PDF ]
[DZG05]
S. Dal Zilio and R. Gascon. Resource Bound Certification for a Tail-Recursive Virtual Machine. In Proceedings of the 3rd Asian Symposium on Programming Languages and Systems (APLAS'05), volume 3780 of Lecture Notes in Computer Science, pages 247--263, Tsukuba, Japan, November 2005. Springer.
doi: 10.1007/11575467_17.
BibTex | DOI | Web page | PS | PDF ]
[VG05]
K. N. Verma and J. Goubault-Larrecq. Karp-Miller Trees for a Branching Extension of VASS. Discrete Mathematics & Theoretical Computer Science, 7(1):217--230, November 2005.
BibTex | Web page | PS | PDF ]
[LS05b]
D. Lugiez and Ph. Schnoebelen. Decidable first-order transition logics for PA-processes. Information and Computation, 203(1):75--113, November 2005.
doi: 10.1016/j.ic.2005.02.003.
BibTex | DOI | Web page | PS | PDF ]
[S+05]
Ph. Schnoebelen et al. ACI Sécurité Informatique PERSÉE --- Rapport à mi-parcours, November 2005. 8 pages.
BibTex ]
[DKK05]
S. Delaune, F. Klay, and S. Kremer. Spécification du protocole de vote électronique. Technical Report 6, projet RNTL PROUVÉ, November 2005. 19 pages.
BibTex | Web page | PS | PDF ]
[Tre05]
R. Treinen. Résolution symbolique de contraintes. Mémoire d'habilitation, Université Paris-Sud 11, Orsay, France, November 2005.
BibTex | Web page | PS | PDF ]
[FL05]
A. Finkel and J. Leroux. The Convex Hull of a Regular Set of Integer Vectors is Polyhedral and Effectively Computable. Information Processing Letters, 96(1):30--35, October 2005.
doi: 10.1016/j.ipl.2005.04.004.
BibTex | DOI | Web page | PS | PDF ]
[BFLS05]
S. Bardin, A. Finkel, J. Leroux, and Ph. Schnoebelen. Flat acceleration in symbolic model checking. In Proceedings of the 3rd International Symposium on Automated Technology for Verification and Analysis (ATVA'05), volume 3707 of Lecture Notes in Computer Science, pages 474--488, Taipei, Taiwan, October 2005. Springer.
doi: 10.1007/11562948_35.
BibTex | DOI | Web page | PS | PDF ]
[BH05]
M. Bidoit and R. Hennicker. Externalized and Internalized Notions of Behavioral Refinement. In Proceedings of the 2nd International Colloquium on Theoretical Aspects of Computing (ICTAC'05), volume 3722 of Lecture Notes in Computer Science, pages 334--350, Hanoi, Vietnam, October 2005. Springer.
doi: 10.1007/11560647_22.
BibTex | DOI | Web page | PDF ]
[AMRT05]
K. Altisen, N. Markey, P.-A. Reynier, and S. Tripakis. Implémentabilité des automates temporisés. In Actes du 5ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'05), pages 395--406, Autrans, France, October 2005. Hermès.
BibTex | Web page | PS | PDF ]
[BCKT05]
P. Bouyer, F. Chevalier, M. Krichen, and S. Tripakis. Observation partielle des systèmes temporisés. In Actes du 5ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'05), pages 381--393, Autrans, France, October 2005. Hermès.
BibTex | Web page | PS | PDF ]
[ABC+05]
K. Altisen, P. Bouyer, T. Cachat, F. Cassez, and G. Gardey. Introduction au contrôle des systèmes temps-réel. In Actes du 5ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'05), pages 367--380, Autrans, France, October 2005. Hermès.
BibTex | Web page | PS | PDF ]
[Dem05b]
S. Demri. A reduction from DLP to PDL. Journal of Logic and Computation, 15(5):767--785, October 2005.
doi: 10.1093/logcom/exi043.
BibTex | DOI | Web page | PDF ]
[DN05]
S. Demri and D. Nowak. Reasoning about transfinite sequences (extended abstract). In Proceedings of the 3rd International Symposium on Automated Technology for Verification and Analysis (ATVA'05), volume 3707 of Lecture Notes in Computer Science, pages 248--262, Taipei, Taiwan, October 2005. Springer.
doi: 10.1007/11562948_20.
BibTex | DOI | Web page | PS | PDF ]
[LLT05b]
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption. Research Report LSV-05-19, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005. 39 pages.
BibTex | Web page | PS | PDF ]
[Bar05]
S. Bardin. Vers un model checking avec accélération plate de systèmes hétérogènes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005.
BibTex | Web page | PDF ]
[Zha05]
Y. Zhang. Cryptographic logical relations -- What is the contextual equivalence for cryptographic protocols and how to prove it? Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005.
BibTex | Web page | PS | PDF ]
[BBG+05]
H. Bel mokadem, B. Bérard, V. Gourcuff, J.-M. Roussel, and O. De Smet. Verification of a timed multitask system with Uppaal. In Proceedings of the 10th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'05), pages 347--354, Catania, Italy, September 2005. IEEE Industrial Electronics Society.
BibTex | Web page | PS | PDF ]
[DKR05]
S. Delaune, S. Kremer, and M. D. Ryan. Receipt-Freeness: Formal Definition and Fault Attacks (Extended Abstract). In Proceedings of the Workshop Frontiers in Electronic Elections (FEE 2005), Milan, Italy, September 2005.
BibTex | Web page | PDF ]
[LNZ05]
S. Lasota, D. Nowak, and Y. Zhang. On completeness of logical relations for monadic types. In Proceedings of the 3rd APPSEM II Workshop (APPSEM'05), Frauenchiemsee, Germany, September 2005.
BibTex | Web page | PDF ]
[Pin05]
S. Pinot. Analyse de stabilité d'algorithme distribués probabilistes. Rapport de Master, Master de Logique Mathématique et Fondements de l'Informatique, Paris, France, September 2005.
BibTex | Web page | PS | PDF ]
[Szn05]
N. Sznajder. Synthèse de contrôleur pour les systèmes distribués synchrones. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2005.
BibTex | Web page | PDF ]
[Bou05e]
P. Bouyer. Optimal Timed Games. Invited talk, 5th International Workshop on Automated Verification of Critical Systems (AVoCS'05), Warwick, UK, September 2005.
BibTex ]
[Bou05c]
P. Bouyer. An Introduction to Timed Automata. In Actes de la 4ème École Temps-Réel (ETR'05), pages 111--123, Nancy, France, September 2005.
BibTex | Web page | PDF ]
[Bou05b]
P. Bouyer. Foundations of Timed Systems. In Proc. of the ARTIST2 Summer School on Component & Modelling, Testing & Verification, and Statical Analysis of Embedded Systems, Nässlingen, Sweden, September-October 2005.
BibTex | Web page | PDF ]
[Bou05a]
F. Bouchy. Bibliothèque de méthodes pour la classification. Rapport de Master, Master Recherche Informatique, Tours, France, September 2005.
BibTex ]
[GRV05]
J. Goubault-Larrecq, M. Roger, and K. N. Verma. Abstraction and Resolution Modulo AC: How to Verify Diffie-Hellman-like Protocols Automatically. Journal of Logic and Algebraic Programming, 64(2):219--251, August 2005.
doi: 10.1016/j.jlap.2004.09.004.
BibTex | DOI | Web page | PS ]
[BBBL05]
H. Bel mokadem, B. Bérard, P. Bouyer, and F. Laroussinie. A New Modality for Almost Everywhere Properties in Timed Automata. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 110--124, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_12.
BibTex | DOI | Web page | PS | PDF ]
[BCL05]
P. Bouyer, F. Cassez, and F. Laroussinie. Modal Logics for Timed Control. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 81--94, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_10.
BibTex | DOI | Web page | PS | PDF ]
[Dem05a]
S. Demri. On the complexity of information logics. Invited talk, Workshop on Logical and Algebraic Foundations of Rough Sets, Regina, Canada, August 2005.
BibTex ]
[DG05a]
S. Demri and R. Gascon. Verification of Qualitative Z-Constraints. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 518--532, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_39.
BibTex | DOI | Web page | PDF ]
[Gou05a]
J. Goubault-Larrecq. Deciding H_1 by Resolution. Information Processing Letters, 95(3):401--408, August 2005.
doi: 10.1016/j.ipl.2005.04.007.
BibTex | DOI | Web page | PDF ]
[MKR05]
A. Mukhamedov, S. Kremer, and E. Ritter. Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. In Revised Papers from the 9th International Conference on Financial Cryptography and Data Security (FC'05), volume 3570 of Lecture Notes in Computer Science, pages 255--269, Roseau, The Commonwealth Of Dominica, August 2005. Springer.
doi: 10.1007/11507840_23.
BibTex | DOI | Web page | PDF ]
[GK05]
P. Gastin and D. Kuske. Uniform Satisfiability Problem for Local Temporal Logics over Mazurkiewicz Traces. In Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), volume 3653 of Lecture Notes in Computer Science, pages 533--547, San Francisco, California, USA, August 2005. Springer.
doi: 10.1007/11539452_40.
BibTex | DOI | Web page | PS | PDF ]
[BJ05b]
A. Bouhoula and F. Jacquemard. Automatic Verification of Sufficient Completeness for Specifications of Complex Data Structures. Research Report LSV-05-17, Laboratoire Spécification et Vérification, ENS Cachan, France, August 2005. 14 pages.
BibTex | Web page | PS | PDF ]
[PR05a]
S. Pinchinat and S. Riedweg. A Decidable Class of Problems for Control under Partial Observation. Information Processing Letters, 95(4):454--465, August 2005.
doi: 10.1016/j.ipl.2005.04.011.
BibTex | DOI | Web page | PS | PDF ]
[The05]
The Artist Education Group. Guidelines for a graduate curriculum on embedded software and systems. ACM Transactions in Embedded Computing Systems, 4(3):587--611, August 2005.
doi: 10.1145/1086519.1086526.
BibTex | DOI | Web page | PDF ]
[Bou05i]
P. Bouyer. Weighted Timed Automata: Model-Checking and Games. Invited talk, Workshop CORTOS'06, Bonn, Germany, August 2005.
BibTex ]
[Bou05d]
P. Bouyer. Optimal Reachability Timed Games. Invited talk, 7th International Workshop on Verification of Infinite State Systems (INFINITY'05), San Francisco, USA, August 2005.
BibTex ]
[Bou05f]
P. Bouyer. Partial Observation of Timed Systems. Invited talk, 2nd Workshop on Games in Design and Verification, Edinburgh, Scotland, July 2005.
BibTex ]
[BCK05]
M. Baudet, V. Cortier, and S. Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of Lecture Notes in Computer Science, pages 652--663, Lisboa, Portugal, July 2005. Springer.
doi: 10.1007/11523468_53.
BibTex | DOI | Web page | PDF ]
[FM05]
L. Fribourg and S. Messika. Brief Announcement: Coupling for Markov Decision Processes --- Application to Self-Stabilization with Arbitrary Schedulers. In Proceedings of the Twenty-Fourth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC'05), page 322, Las Vegas, Nevada, USA, July 2005. ACM Press.
doi: 10.1145/1073814.1073875.
BibTex | DOI | Web page | PS | PDF ]
[DG05b]
M. Droste and P. Gastin. Weighted Automata and Weighted Logics. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of Lecture Notes in Computer Science, pages 513--525, Lisboa, Portugal, July 2005. Springer.
doi: 10.1007/11523468_42.
BibTex | DOI | Web page | PS | PDF ]
[BJ05a]
A. Bouhoula and F. Jacquemard. Automated Induction for Complex Data Structures. Research Report LSV-05-11, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2005. 24 pages.
BibTex | Web page | PS | PDF ]
[OG05]
J. Olivain and J. Goubault-Larrecq. The Orchids Intrusion Detection Tool. In Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), volume 3576 of Lecture Notes in Computer Science, pages 286--290, Edinburgh, Scotland, UK, July 2005. Springer.
doi: 10.1007/11513988_28.
BibTex | DOI | Web page | PDF ]
[DdN05]
S. Demri and H. de Nivelle. Deciding Regular Grammar Logics with Converse through First-Order Logic. Journal of Logic, Language and Information, 14(3):289--319, June 2005.
doi: 10.1007/s10849-005-5788-9.
BibTex | DOI | Web page | PDF ]
[DLN05]
S. Demri, R. Lazić, and D. Nowak. On the Freeze Quantifier in Constraint LTL: Decidability and Complexity. In Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME'05), pages 113--121, Burlington, Vermont, USA, June 2005. IEEE Computer Society Press.
doi: 10.1109/TIME.2005.28.
BibTex | DOI | Web page | PS | PDF ]
[BHS+05]
S. Bardin, F. Herbreteau, M. Sighireanu, G. Sutre, and A. Vincent. Intégration des outils PERSÉE (Proposition d'architecture). Délivrable 3.1 --- Partie 1 du Projet PERSÉE de l'ACI Sécurité Informatique, June 2005. 35 pages.
BibTex | Web page | PDF ]
[PR05c]
S. Pinchinat and S. Riedweg. You Can Always Compute Maximally Permissive Controllers Under Partial Observation When They Exist. In Proceedings of the 24th American Control Conference (ACC'05), pages 2287--2292, Portland, Oregon, USA, June 2005. IEEECSP.
BibTex | Web page | PS | PDF ]
[DFH+05]
M. Duflot, L. Fribourg, Th. Hérault, R. Lassaigne, F. Magniette, S. Messika, S. Peyronnet, and C. Picaronny. Probabilistic Model Checking of the CSMA/CD Protocol Using PRISM and APMC. In Proceedings of the 4th International Workshop on Automated Verification of Critical Systems (AVoCS'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 195--214, London, UK, May 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2005.04.012.
BibTex | DOI | Web page | PDF ]
[DFV05]
Ch. Darlot, A. Finkel, and L. Van Begin. About Fast and TReX Accelerations. In Proceedings of the 4th International Workshop on Automated Verification of Critical Systems (AVoCS'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 87--103, London, UK, May 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2005.04.006.
BibTex | DOI | Web page | PDF ]
[KR05a]
S. Kremer and M. D. Ryan. Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks. In Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 84--107, London, UK, May 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2004.11.043.
BibTex | DOI | Web page | PDF ]
[BC05a]
M. Baclet and R. Chevallier. Timed Verification of the SPSMALL Memory. In Proceedings of the 1st International Conference on Memory Technology and Design (ICMTD'05), pages 89--92, Giens, France, May 2005.
BibTex | Web page | PDF ]
[FGRV05b]
A. Finkel, G. Geeraerts, J.-F. Raskin, and L. Van Begin. On the Omega-Language Expressive Power of Extended Petri Nets. In Proceedings of the 11th International Workshop on Expressiveness in Concurrency (EXPRESS'04), volume 128 of Electronic Notes in Theoretical Computer Science, pages 87--101, London, UK, April 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2004.11.030.
BibTex | DOI | Web page | PDF ]
[Gou05b]
J. Goubault-Larrecq. Extensions of Valuations. Mathematical Structures in Computer Science, 15(2):271--297, April 2005.
doi: 10.1017/S096012950400461X.
BibTex | DOI | Web page | PS ]
[BCD05]
P. Bouyer, F. Chevalier, and D. D'Souza. Fault Diagnosis Using Timed Automata. In Proceedings of the 8th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'05), volume 3441 of Lecture Notes in Computer Science, pages 219--233, Edinburgh, Scotland, UK, April 2005. Springer.
doi: 10.1007/b106850.
BibTex | DOI | Web page | PS | PDF ]
[CD05]
H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), volume 3467 of Lecture Notes in Computer Science, pages 294--307, Nara, Japan, April 2005. Springer.
doi: 10.1007/b135673.
BibTex | DOI | Web page | PS | PDF ]
[B+05]
P. Bouyer et al. ACI Sécurité Informatique CORTOS << Control and Observation of Real-Time Open Systems >> --- Rapport à mi-parcours, April 2005. 6 pages.
BibTex | Web page | PDF ]
[KR05b]
S. Kremer and M. D. Ryan. Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus. In Programming Languages and Systems --- Proceedings of the 14th European Symposium on Programming (ESOP'05), volume 3444 of Lecture Notes in Computer Science, pages 186--200, Edinburgh, Scotland, UK, April 2005. Springer.
doi: 10.1007/b107380.
BibTex | DOI | Web page | PS | PDF ]
[LLT05a]
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder Deduction for AC-like Equational Theories with Homomorphisms. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), volume 3467 of Lecture Notes in Computer Science, pages 308--322, Nara, Japan, April 2005. Springer.
doi: 10.1007/b135673.
BibTex | DOI | Web page | PS | PDF ]
[LS05a]
F. Laroussinie and J. Sproston. Model Checking Durational Probabilistic Systems. In Proceedings of the 8th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'05), volume 3441 of Lecture Notes in Computer Science, pages 140--154, Edinburgh, Scotland, UK, April 2005. Springer.
doi: 10.1007/b106850.
BibTex | DOI | Web page | PS | PDF ]
[Bou05h]
P. Bouyer. Timed Automata and Extensions: Decidability Limits. Invited talk, 5èmes Journées Systèmes Infinis (JSI'05), Cachan, France, March 2005.
BibTex ]
[Bou05g]
P. Bouyer. Synthesis of Timed Systems. Invited lecture, Spring School on Infinite Games and Their Applications, Bonn, Germany, March 2005.
BibTex ]
[BDKV05]
L. Bozga, S. Delaune, F. Klay, and L. Vigneron. Retour d'expérience sur la validation du porte-monnaie électronique. Technical Report 5, projet RNTL PROUVÉ, March 2005. 29 pages.
BibTex | Web page | PS ]
[BCFL05]
P. Bouyer, F. Cassez, E. Fleury, and K. G. Larsen. Synthesis of Optimal Strategies Using HyTech. In Proceedings of the Workshop on Games in Design and Verification (GDV'04), volume 119 of Electronic Notes in Theoretical Computer Science, pages 11--31, Boston, Massachusetts, USA, February 2005. Elsevier Science Publishers.
doi: 10.1016/j.entcs.2004.07.006.
BibTex | DOI | Web page | PS | PDF ]
[CC05]
H. Comon and V. Cortier. Tree Automata with One Memory, Set Constraints and Cryptographic Protocols. Theoretical Computer Science, 331(1):143--214, February 2005.
doi: 10.1016/j.tcs.2004.09.036.
BibTex | DOI | Web page | PS ]
[Cou05]
J.-M. Couvreur. A BDD-like Implementation of an Automata Package. In Revised Selected Papers of the 9th International Conference on Implementation and Application of Automata (CIAA'04), volume 3317 of Lecture Notes in Computer Science, pages 310--311, Kingston, Ontario, Canada, January 2005. Springer.
doi: 10.1007/b105090.
BibTex | DOI ]
[BS05]
B. Bouyssonouse and J. Sifakis, editors. Embedded Systems Design: The ARTIST Roadmap for Research and Development, volume 3436 of Lecture Notes in Computer Science. Springer, 2005.
doi: 10.1007/b106761.
BibTex | DOI | Web page ]
[GP05]
J. Goubault-Larrecq and F. Parrennes. Cryptographic Protocol Analysis on Real C Code. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363--379, Paris, France, January 2005. Springer.
doi: 10.1007/b105073.
BibTex | DOI | Web page | PDF ]
[FGRV05a]
A. Finkel, G. Geeraerts, J.-F. Raskin, and L. Van Begin. A counter-example the the minimal coverability tree algorithm. Technical Report 535, Université Libre de Bruxelles, Belgium, 2005.
BibTex | Web page | PDF ]
[BC05b]
P. Bouyer and F. Chevalier. On Conciseness of Extensions of Timed Automata. Journal of Automata, Languages and Combinatorics, 10(4):393--405, 2005.
BibTex | Web page | PS | PDF ]
[Dem05c]
S. Demri. Temporal logics, 2005. Course notes, Master Parisien de Recherche en Informatique, Paris, France.
BibTex | Web page | PDF ]

This file was generated by bibtex2html 1.98.

About LSV