Kokichi Futatsugi
Proceedings of the Third International Workshop on Rewriting Logic and its Applications
WRLA-2000, 2000.
@proceedings{WRLA-2000, editor = "Kokichi Futatsugi", journal = "{Electronic Notes in Theoretical Computer Science}", title = "{Proceedings of the Third International Workshop on Rewriting Logic and its Applications}", volume = 36, year = 2000, }
Contents (22 items)
- WRLA-2000-GoguenLR #behaviour #induction
- Behavioral and Coinductive Rewriting (JAG, KL, GR), pp. 2–23.
- WRLA-2000-CirsteaK #calculus
- The simply typed rewriting calculus (HC, CK), pp. 24–42.
- WRLA-2000-Hilberdink #logic
- New Foundations for Rewriting Logic (HH), pp. 43–69.
- WRLA-2000-Stehr #calculus #named
- CINNI — A Generic Calculus of Explicit Substitutions and its Application to λ-, ς- and pi- Calculi (MOS), pp. 70–92.
- WRLA-2000-KirchnerG #normalisation #proving #termination
- Termination and normalisation under strategy Proofs in ELAN (HK, IG), pp. 93–120.
- WRLA-2000-LeuckerN #framework #logic #tool support #verification
- Rewriting Logic as a Framework for Generic Verification Tools (ML, TN), pp. 121–137.
- WRLA-2000-BrandR #asf+sdf #parsing #tool support
- ASF+SDF parsing tools applied to ELAN (MvdB, CR), pp. 138–157.
- WRLA-2000-KulasB #logic #prolog #standard
- Defining Standard Prolog in Rewriting Logic (MK, CB), pp. 158–174.
- WRLA-2000-Pattinson #logic
- Modal Logic for Rewriting Theories (DP), pp. 175–193.
- WRLA-2000-Ringeissen #finite #rule-based
- Handling Relations over Finite Domains in the Rule-Based System ELAN (CR), pp. 194–211.
- WRLA-2000-NakamuraO #evaluation #normalisation #on-demand
- The evaluation strategy for head normal form with and without on-demand flags (MN, KO), pp. 212–228.
- WRLA-2000-Millen #analysis #encryption #overview #protocol #term rewriting
- Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
- WRLA-2000-BasinD #analysis #comparison #haskell #maude #protocol #security
- Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
- WRLA-2000-Rodriguez #analysis #case study #maude #protocol #specification
- Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
- WRLA-2000-MasonT #maude #network #protocol #simulation
- Simple Network Protocol Simulation within Maude (IAM, CLT), pp. 274–291.
- WRLA-2000-Nakashima #information management #overview
- Cyber Assistance for Situtated Human Information Processing Overview of the invited talk (HN), pp. 292–293.
- WRLA-2000-ClavelDELMMQ #maude #towards
- Towards Maude 2.0 (MC, FD, SE, PL, NMO, JM, JFQ), pp. 294–315.
- WRLA-2000-DuranM #maude
- Parameterized Theories and Views in Full Maude 2.0 (FD, JM), pp. 316–338.
- WRLA-2000-ClavelDM #maude #programming
- Polytypic Programming in Maude (MC, FD, NMO), pp. 339–360.
- WRLA-2000-OlveczkyM #hybrid #maude #realtime #simulation
- Real-Time Maude: A Tool for Simulating and Analyzing Real-Time and Hybrid Systems (PCÖ, JM), pp. 361–382.
- WRLA-2000-VerdejoPM #maude #protocol
- The Leader Election Protocol of IEEE 1394 in Maude (AV, IP, NMO), pp. 383–404.
- WRLA-2000-DenkerMT #composition #distributed #semantics
- Rewriting Semantics of Meta-Objects and Composable Distributed Services (GD, JM, CLT), pp. 405–425.
8 ×#maude
5 ×#protocol
4 ×#logic
3 ×#analysis
2 ×#bibliography
2 ×#calculus
2 ×#normalisation
2 ×#simulation
2 ×#tool support
5 ×#protocol
4 ×#logic
3 ×#analysis
2 ×#bibliography
2 ×#calculus
2 ×#normalisation
2 ×#simulation
2 ×#tool support