The join of equational theories
Don Pigozzi (1974)
Colloquium Mathematicae
Similarity:
Don Pigozzi (1974)
Colloquium Mathematicae
Similarity:
A. Macintyre, H. Simmons (1973)
Colloquium Mathematicae
Similarity:
Radev, Slavian (2007)
Serdica Journal of Computing
Similarity:
In the present paper we investigate the life cycles of formalized theories that appear in decision making instruments and science. In few words mixed theories are build in the following steps: Initially a small collection of facts is the kernel of the theory. To express these facts we make a special formalized language. When the collection grows we add some inference rules and thus some axioms to compress the knowledge. The next step is to generalize these rules to all expressions in...
Mouhebeddine Berrima, Narjes Ben Rajeb, Véronique Cortier (2011)
RAIRO - Theoretical Informatics and Applications
Similarity:
In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the...
Enrique Casanovas, Rodrigo Peláez, Martin Ziegler (2011)
Fundamenta Mathematicae
Similarity:
We prove that every many-sorted ω-categorical theory is completely interpretable in a one-sorted ω-categorical theory. As an application, we give a short proof of the existence of non-G-compact ω-categorical theories.
Mouhebeddine Berrima, Narjes Ben Rajeb, Véronique Cortier (2011)
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
Similarity:
In the last decade, formal methods have proved their interest when analyzing security protocols. Security protocols require in particular to reason about the attacker knowledge. Two standard notions are often considered in formal approaches: deducibility and indistinguishability relations. The first notion states whether an attacker can learn the value of a secret, while the latter states whether an attacker can notice some difference between protocol runs with different values of the...
Catherine Z. Elgin (1997)
Philosophia Scientiae
Similarity:
Kapetanović, M. (1999)
Publications de l'Institut Mathématique. Nouvelle Série
Similarity:
Jelínek, Vít, Mansour, Toufik (2009)
The Electronic Journal of Combinatorics [electronic only]
Similarity:
Roman Suszko (1974)
Colloquium Mathematicae
Similarity:
Burstein, Alexander, Mansour, Toufik (2003)
Discrete Mathematics and Theoretical Computer Science. DMTCS [electronic only]
Similarity: