This paper presents a survey of the practical application of protocol verification techniques to applications in ecommerce. We concentrate in particular on logic based approaches, and review the current state of the art as well as the prospects for realistic deployment of protocol verification techniques in the near future
This paper reassesses the role of economic fundamentals in the 1987 stock market crash using a two f...
Very fast tree-structured vector quantization employs scalar quantization decisions at each level, b...
Conventional methods for state space exploration are limited to the analysis of small systems becaus...
Rapport interne.From intuitionistic proof nets of linear logic, we abstract an order between axiom l...
cerbah2001aInternational audienceModeling often concerns the translation of informal texts into repr...
A sufficient condition for the period's function monotonicity on a period annulus is given. The appr...
Efficient low-level systems need more control over memory than safe high-level languages usually pro...
Industrial process data is often stored in a wide variety of formats and in several different re...
We report on a project that performed a bigram analysis of dynamic bytecode sequences. The objective...
In many cryptographic protocols, the actions performed by principals are iterative processes. Howeve...
A new method for the construction of Fock-adapted operator Markovian cocycles is outlined, and its u...
International audienceWe discuss interval techniques for speeding up the exact evaluation of geometr...
Absence of a priori knowledge about a problem domain typically forces use of overly complex neural n...
This paper presents a specification of the IP layer in linear logic and shows how linear logic can b...
We present a high-order discontinuous Galerkin method for the solution of the shallow water equation...
This paper reassesses the role of economic fundamentals in the 1987 stock market crash using a two f...
Very fast tree-structured vector quantization employs scalar quantization decisions at each level, b...
Conventional methods for state space exploration are limited to the analysis of small systems becaus...
Rapport interne.From intuitionistic proof nets of linear logic, we abstract an order between axiom l...
cerbah2001aInternational audienceModeling often concerns the translation of informal texts into repr...
A sufficient condition for the period's function monotonicity on a period annulus is given. The appr...
Efficient low-level systems need more control over memory than safe high-level languages usually pro...
Industrial process data is often stored in a wide variety of formats and in several different re...
We report on a project that performed a bigram analysis of dynamic bytecode sequences. The objective...
In many cryptographic protocols, the actions performed by principals are iterative processes. Howeve...
A new method for the construction of Fock-adapted operator Markovian cocycles is outlined, and its u...
International audienceWe discuss interval techniques for speeding up the exact evaluation of geometr...
Absence of a priori knowledge about a problem domain typically forces use of overly complex neural n...
This paper presents a specification of the IP layer in linear logic and shows how linear logic can b...
We present a high-order discontinuous Galerkin method for the solution of the shallow water equation...
This paper reassesses the role of economic fundamentals in the 1987 stock market crash using a two f...
Very fast tree-structured vector quantization employs scalar quantization decisions at each level, b...
Conventional methods for state space exploration are limited to the analysis of small systems becaus...