Published in: Dagstuhl Seminar Proceedings, Volume 8171, Beyond the Finite: New Challenges in Verification and Semistructured Data (2008)
Anca Muscholl, Ramaswamy Ramanujam, Michaël Rusinowitch, Thomas Schwentick, and Victor Vianu. 08171 Abstracts Collection – Beyond the Finite: New Challenges in Verification and Semistructured Data. In Beyond the Finite: New Challenges in Verification and Semistructured Data. Dagstuhl Seminar Proceedings, Volume 8171, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{muscholl_et_al:DagSemProc.08171.1, author = {Muscholl, Anca and Ramanujam, Ramaswamy and Rusinowitch, Micha\"{e}l and Schwentick, Thomas and Vianu, Victor}, title = {{08171 Abstracts Collection – Beyond the Finite: New Challenges in Verification and Semistructured Data}}, booktitle = {Beyond the Finite: New Challenges in Verification and Semistructured Data}, pages = {1--14}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {8171}, editor = {Anca Muscholl and Ramaswamy Ramanujam and Micha\"{e}l Rusinowitch and Thomas Schwentick and Victor Vianu}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08171.1}, URN = {urn:nbn:de:0030-drops-15606}, doi = {10.4230/DagSemProc.08171.1}, annote = {Keywords: Infinite state systems, data values, verification, semistructured data} }
Published in: Dagstuhl Seminar Proceedings, Volume 8171, Beyond the Finite: New Challenges in Verification and Semistructured Data (2008)
Anca Muscholl, Ramaswamy Ramanujam, Michaël Rusinowitch, Thomas Schwentick, and Victor Vianu. 08171 Summary – Beyond the Finite: New Challenges in Verification and Semistructured Data. In Beyond the Finite: New Challenges in Verification and Semistructured Data. Dagstuhl Seminar Proceedings, Volume 8171, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{muscholl_et_al:DagSemProc.08171.2, author = {Muscholl, Anca and Ramanujam, Ramaswamy and Rusinowitch, Micha\"{e}l and Schwentick, Thomas and Vianu, Victor}, title = {{08171 Summary – Beyond the Finite: New Challenges in Verification and Semistructured Data}}, booktitle = {Beyond the Finite: New Challenges in Verification and Semistructured Data}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {8171}, editor = {Anca Muscholl and Ramaswamy Ramanujam and Micha\"{e}l Rusinowitch and Thomas Schwentick and Victor Vianu}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08171.2}, URN = {urn:nbn:de:0030-drops-15580}, doi = {10.4230/DagSemProc.08171.2}, annote = {Keywords: Infinite state systems, data values, verification, semistructured data} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Eugen Zalinescu, Véronique Cortier, and Michaël Rusinowitch. Relating two standard notions of secrecy. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{zalinescu_et_al:OASIcs.TrustworthySW.2006.691, author = {Zalinescu, Eugen and Cortier, V\'{e}ronique and Rusinowitch, Micha\"{e}l}, title = {{Relating two standard notions of secrecy}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--29}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.691}, URN = {urn:nbn:de:0030-drops-6911}, doi = {10.4230/OASIcs.TrustworthySW.2006.691}, annote = {Keywords: Verification, security protocols, secrecy, applied-pi calculus} }
Feedback for Dagstuhl Publishing