Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 A ρ-Calculus of Explicit Constraint Application Cirstea, Horatiu
2005
117 C p. 51-67
17 p.
article
2 A Computational Definition of the Notion of Vectorial Space Arrighi, Pablo
2005
117 C p. 249-261
13 p.
article
3 Ambient Graph Rewriting Cenciarelli, Pietro
2005
117 C p. 335-351
17 p.
article
4 A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls Johnsen, Einar Broch
2005
117 C p. 375-392
18 p.
article
5 μ-Calculus Model Checking in Maude Wang, Bow-Yaw
2005
117 C p. 135-152
18 p.
article
6 Communicating Concurrent Objects in HiddenCCS Ciobanu, Gabriel
2005
117 C p. 353-373
21 p.
article
7 Constraint Functional Logic Programming Revisited López-Fraguas, F. Javier
2005
117 C p. 5-50
46 p.
article
8 Formal Checklists for Remote Agent Dependability Denker, Grit
2005
117 C p. 229-248
20 p.
article
9 From Rogue to MicroRogue Stump, Aaron
2005
117 C p. 69-87
19 p.
article
10 IOP: The InterOperability Platform & IMaude: An Interactive Extension of Maude Mason, Ian A.
2005
117 C p. 315-333
19 p.
article
11 Modular Rewriting Semantics in Practice Braga, Christiano
2005
117 C p. 393-416
24 p.
article
12 New Evaluation Commands for Maude Within Full Maude Durán, Francisco
2005
117 C p. 263-284
22 p.
article
13 Preface Martí-Oliet, Narciso
2005
117 C p. 1-4
4 p.
article
14 Proving VLRL Action Properties with the Maude Model Checker Palomino, Miguel
2005
117 C p. 113-133
21 p.
article
15 Real-Time Maude 2.1 Ölveczky, Peter Csaba
2005
117 C p. 285-314
30 p.
article
16 Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types Cervesato, Iliano
2005
117 C p. 183-207
25 p.
article
17 Rule-based Programming in Java For Protocol Verification Cirstea, Horatiu
2005
117 C p. 209-227
19 p.
article
18 Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols Meseguer, José
2005
117 C p. 153-182
30 p.
article
19 The Polymorphic Rewriting-calculus Liquori, Luigi
2005
117 C p. 89-111
23 p.
article
20 Towards a Strategy Language for Maude Martí-Oliet, Narciso
2005
117 C p. 417-441
25 p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands