Search

Your search keyword '"Santiago Escobar"' showing total 343 results

Search Constraints

Start Over You searched for: Author "Santiago Escobar" Remove constraint Author: "Santiago Escobar"
343 results on '"Santiago Escobar"'

Search Results

201. Strand spaces with choice via a process algebra semantics

202. Built-in Variant Generation and Unification, and Their Applications in Maude 2.7

203. Innovación en la transformación productiva industrial: aportes a la discusión

204. Modular termination of basic narrowing and equational unification

205. A Tool for Automated Certification of Java Source Code in Maude

206. Order-Sorted Generalization

207. Rewriting Logic and Its Applications : 10th International Workshop, WRLA 2014, Held As a Satellite Event of ETAPS, Grenoble, France, April 5-6, 2014, Revised Selected Papers

208. Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer

209. Removing redundant arguments automatically

210. Citadels in Conflict –Dissertation Project–

211. Unidades de atención primaria en oftalmología en Chile: historia y funciones

213. Analysis of the PKCS#11 API Using the Maude-NPA Tool

214. Two Decades of Maude

215. Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories

216. On-demand Evaluation for Maude

217. Correct and Complete (Positive) Strategy Annotations for OBJ

218. On-demand Evaluation by Program Transformation1 1Work partially supported by CICYT TIC2001-2705-C03-01 and MCYT grants HA2001-0059 and HU2001-0019

219. OnDemandOBJ

220. Redundancy of Arguments Reduced to Induction

221. Theories of Homomorphic Encryption, Unification, and the Finite Variant Property

222. [History and functions of Chilean ophthalmologic primary care units]

223. A rewriting-based forwards semantics for Maude-NPA

225. A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA

226. Functional and (Constraint) Logic Programming

227. Incremental and Adaptive Software Systems Development of Natural Language Applications

228. Analysis of the IBM CCA Security API Protocols in Maude-NPA

229. OASIcs, Volume 46, WPTE'15, Complete Volume

230. Frontmatter, Table of Contents, Preface, Workshop Organization

231. Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

233. Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions

234. Argentina : la historia después de la historia

235. Protocol analysis in Maude-NPA using unification modulo homomorphic encryption

236. Protocol analysis modulo combination of theories: A case study in Maude-NPA

237. Approximating Non-interference and Erasure in Rewriting Logic

239. Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties

240. A Modular Equational Generalization Algorithm

241. Automated Certification of Non-Interference in Rewriting Logic

242. Modular Termination of Basic Narrowing

243. Directed-Logical Testing for Functional Verification of Microprocessors

244. Automatic Certification of Java Source Code in Rewriting Logic

245. State Space Reduction in the Maude-NRL Protocol Analyzer

246. Termination of Narrowing Using Dependency Pairs

247. Symbolic Model Checking of Infinite-State Systems Using Narrowing

249. A rewriting-based inference system for the NRL protocol analyzer

Catalog

Books, media, physical & digital resources