Büchi automaton

Results: 70



#Item
31Unambiguous Finite Automata ¨ Christof Loding Department of Computer Science RWTH Aachen University, Germany

Unambiguous Finite Automata ¨ Christof Loding Department of Computer Science RWTH Aachen University, Germany

Add to Reading List

Source URL: www.automata.rwth-aachen.de

Language: English - Date: 2013-06-27 09:04:03
32LTL-Model-Checking via Model Composition Ingo Felscher RWTH Aachen University, 52074 Aachen, Germany, [removed], http://automata.rwth-aachen.de/~felscher/

LTL-Model-Checking via Model Composition Ingo Felscher RWTH Aachen University, 52074 Aachen, Germany, [removed], http://automata.rwth-aachen.de/~felscher/

Add to Reading List

Source URL: www.automata.rwth-aachen.de

Language: English - Date: 2013-03-01 05:03:49
33Constructions and Algorithms for ω -Automata ¨ Christof Loding RWTH Aachen University, Germany  Workshop Automaten und Logik“ beim Theorietag Automaten

Constructions and Algorithms for ω -Automata ¨ Christof Loding RWTH Aachen University, Germany Workshop Automaten und Logik“ beim Theorietag Automaten

Add to Reading List

Source URL: www.automata.rwth-aachen.de

Language: English - Date: 2013-10-24 06:57:04
34October 3, [removed]:38 WSPC/INSTRUCTION FILE

October 3, [removed]:38 WSPC/INSTRUCTION FILE

Add to Reading List

Source URL: www.automata.rwth-aachen.de

Language: English - Date: 2012-10-03 15:38:17
35A Topological Perspective on Diagnosis Andreas Bauer, ANU, Australia Abstract— We propose a topological perspective on the diagnosis problem for discrete-event systems. In an infinitary framework, we argue that the con

A Topological Perspective on Diagnosis Andreas Bauer, ANU, Australia Abstract— We propose a topological perspective on the diagnosis problem for discrete-event systems. In an infinitary framework, we argue that the con

Add to Reading List

Source URL: www.immerundewig.at

Language: English - Date: 2008-05-27 22:19:01
36Microsoft PowerPoint - LTL to Buchi.ppt

Microsoft PowerPoint - LTL to Buchi.ppt

Add to Reading List

Source URL: www.cse.unsw.edu.au

Language: English - Date: 2006-06-05 00:33:10
37Security Protocols, Properties, and their Monitoring Andreas Bauer Jan Jürjens  Computer Sciences Laboratory

Security Protocols, Properties, and their Monitoring Andreas Bauer Jan Jürjens Computer Sciences Laboratory

Add to Reading List

Source URL: www.immerundewig.at

Language: English - Date: 2008-05-27 22:19:01
38On the Application of Formal Methods for Specifying and Verifying Distributed Protocols

On the Application of Formal Methods for Specifying and Verifying Distributed Protocols

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2008-05-27 20:54:36
39RE-Tree: An Efficient Index Structure for Regular Expressions Chee-Yong Chan, Minos Garofalakis, Rajeev Rastogi Bell Labs, Lucent Technologies cychan,minos,rastogi @research.bell-labs.com 

RE-Tree: An Efficient Index Structure for Regular Expressions Chee-Yong Chan, Minos Garofalakis, Rajeev Rastogi Bell Labs, Lucent Technologies cychan,minos,rastogi @research.bell-labs.com 

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 02:03:00
40Deciding the weak definability of Büchi definable tree languages∗ Thomas Colcombet1 , Denis Kuperberg2 , Christof Löding3 , and Michael Vanden Boom4 1,2 CNRS and LIAFA, Université Paris Diderot Paris, France

Deciding the weak definability of Büchi definable tree languages∗ Thomas Colcombet1 , Denis Kuperberg2 , Christof Löding3 , and Michael Vanden Boom4 1,2 CNRS and LIAFA, Université Paris Diderot Paris, France

Add to Reading List

Source URL: www.liafa.univ-paris-diderot.fr

Language: English - Date: 2013-07-10 12:10:51