[PDF][PDF] Tree automata techniques and applications

H Comon, M Dauchet, R Gilleron, F Jacquemard… - 2008 - inria.hal.science
During the past few years, several of us have been asked many times about references on
finite tree automata. On one hand, this is the witness of the liveness of this field. On the other …

On name generation and set-based analysis in the Dolev-Yao model

RM Amadio, W Charatonik - … Conference Brno, Czech Republic, August 20 …, 2002 - Springer
We study the control reachability problem in the Dolev-Yao model of cryptographic protocols
when principals are represented by tail recursive processes with generated names. We …

Is it possible to decide whether a cryptographic protocol is secure or not?

H Comon, V Shmatikov - Journal of Telecommunications and Information …, 2002 - jtit.pl
We consider the so called``cryptographic protocols``whose aim is to ensure some security
properties when communication channels are not reliable. Such protocols usually rely on …

Tree automata with one memory set constraints and cryptographic protocols

H Comon, V Cortier - Theoretical Computer Science, 2005 - Elsevier
We introduce a class of tree automata that perform tests on a memory that is updated using
function symbol application and projection. The language emptiness problem for this class …

Automata on DAG representations of finite trees

W Charatonik - 1999 - pure.mpg.de
We introduce a new class of finite automata. They are usual bottom-up tree automata that
run on DAG representations of finite trees. We prove that the emptiness problem for this …

Normalizable horn clauses, strongly recognizable relations, and spi

F Nielson, HR Nielson, H Seidl - International Static Analysis Symposium, 2002 - Springer
We exhibit a rich class of Horn clauses, which we call H _ 1, whose least models, though
possibly infinite, can be computed effectively. We show that the least model of an H _ 1 …

Tree automata with one memory, set constraints, and ping-pong protocols

H Comon, V Cortier, J Mitchell - International Colloquium on Automata …, 2001 - Springer
We introduce a class of tree automata that perform tests on a memory that is updated using
function symbol application and projection. The language emptiness problem for this class …

Set constraints: A pearl in research on constraints

L Pacholski, A Podelski - … Conference on Principles and Practice of …, 1997 - Springer
The topic of set constraints is a pearl among the research topics on constraints. It combines
theoretical investigations (ranging from logical expressiveness, decidability, algorithms and …

Structural subtyping of non-recursive types is decidable

V Kuncak, M Rinard - 18th Annual IEEE Symposium of Logic in …, 2003 - ieeexplore.ieee.org
We show that the first-order theory of structural subtyping of non-recursive types is
decidable, as a consequence of a more general result on the decidability of term powers of …

[PDF][PDF] The complexity of simple subtyping systems

J Rehof - 1998 - Citeseer
The main objective of this thesis is to understand why polymorphic subtype inference
systems may be inherently di cult to scale up. This is done through a study of the complexity …