Search

Your search keyword '"Narendran, Paliath"' showing total 304 results

Search Constraints

Start Over You searched for: Author "Narendran, Paliath" Remove constraint Author: "Narendran, Paliath"
304 results on '"Narendran, Paliath"'

Search Results

1. Existence and Construction of a Gr\'obner Basis for a Polynomial Ideal

2. Deciding Knowledge Problems Modulo Classes of Permutative Theories

3. CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms

4. On Problems Dual to Unification: The String-Rewriting Case

5. On Asymmetric Unification for the Theory of XOR with a Homomorphism

7. Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems

8. On Problems Dual to Unification

9. Asymmetric Unification and Disunification

10. Lynch-Morawska Systems on Strings

11. Notes on Lynch-Morawska Systems

12. On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry

13. Unification Modulo Lists with Reverse Relation with Certain Word Equations

14. Reviving Basic Narrowing Modulo

15. Asymmetric Unification and Disunification

16. Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining

18. On the Complexity of the Tiden-Arnborg Algorithm for Unification modulo One-Sided Distributivity

19. Unification modulo a partial theory of exponentiation

20. Inferring RPO Symbol Ordering

23. Unification and Matching in Hierarchical Combinations of Syntactic Theories

25. On Asymmetric Unification and the Combination Problem in Disjoint Theories

26. On Forward Closure and the Finite Variant Property

27. Hierarchical Combination

28. Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

29. Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions

30. Unification Modulo Synchronous Distributivity

31. New Algorithms for Unification Modulo One-Sided Distributivity and Its Variants

32. Unification Modulo Chaining

34. Unification Modulo Homomorphic Encryption

35. On Extended Regular Expressions

37. Intruders with Caps

39. ACID-Unification Is NEXPTIME-Decidable

42. The Theory of Total Unary RPO Is Decidable

43. RPO Constraint Solving Is in NP

47. Unification and matching modulo nilpotence

Catalog

Books, media, physical & digital resources