nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A ρ-Calculus of Explicit Constraint Application
|
Cirstea, Horatiu |
|
2005 |
117 |
C |
p. 51-67 17 p. |
artikel |
2 |
A Computational Definition of the Notion of Vectorial Space
|
Arrighi, Pablo |
|
2005 |
117 |
C |
p. 249-261 13 p. |
artikel |
3 |
Ambient Graph Rewriting
|
Cenciarelli, Pietro |
|
2005 |
117 |
C |
p. 335-351 17 p. |
artikel |
4 |
A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls
|
Johnsen, Einar Broch |
|
2005 |
117 |
C |
p. 375-392 18 p. |
artikel |
5 |
μ-Calculus Model Checking in Maude
|
Wang, Bow-Yaw |
|
2005 |
117 |
C |
p. 135-152 18 p. |
artikel |
6 |
Communicating Concurrent Objects in HiddenCCS
|
Ciobanu, Gabriel |
|
2005 |
117 |
C |
p. 353-373 21 p. |
artikel |
7 |
Constraint Functional Logic Programming Revisited
|
López-Fraguas, F. Javier |
|
2005 |
117 |
C |
p. 5-50 46 p. |
artikel |
8 |
Formal Checklists for Remote Agent Dependability
|
Denker, Grit |
|
2005 |
117 |
C |
p. 229-248 20 p. |
artikel |
9 |
From Rogue to MicroRogue
|
Stump, Aaron |
|
2005 |
117 |
C |
p. 69-87 19 p. |
artikel |
10 |
IOP: The InterOperability Platform & IMaude: An Interactive Extension of Maude
|
Mason, Ian A. |
|
2005 |
117 |
C |
p. 315-333 19 p. |
artikel |
11 |
Modular Rewriting Semantics in Practice
|
Braga, Christiano |
|
2005 |
117 |
C |
p. 393-416 24 p. |
artikel |
12 |
New Evaluation Commands for Maude Within Full Maude
|
Durán, Francisco |
|
2005 |
117 |
C |
p. 263-284 22 p. |
artikel |
13 |
Preface
|
Martí-Oliet, Narciso |
|
2005 |
117 |
C |
p. 1-4 4 p. |
artikel |
14 |
Proving VLRL Action Properties with the Maude Model Checker
|
Palomino, Miguel |
|
2005 |
117 |
C |
p. 113-133 21 p. |
artikel |
15 |
Real-Time Maude 2.1
|
Ölveczky, Peter Csaba |
|
2005 |
117 |
C |
p. 285-314 30 p. |
artikel |
16 |
Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types
|
Cervesato, Iliano |
|
2005 |
117 |
C |
p. 183-207 25 p. |
artikel |
17 |
Rule-based Programming in Java For Protocol Verification
|
Cirstea, Horatiu |
|
2005 |
117 |
C |
p. 209-227 19 p. |
artikel |
18 |
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols
|
Meseguer, José |
|
2005 |
117 |
C |
p. 153-182 30 p. |
artikel |
19 |
The Polymorphic Rewriting-calculus
|
Liquori, Luigi |
|
2005 |
117 |
C |
p. 89-111 23 p. |
artikel |
20 |
Towards a Strategy Language for Maude
|
Martí-Oliet, Narciso |
|
2005 |
117 |
C |
p. 417-441 25 p. |
artikel |