Proceedings of the Fifth International Workshop on Rewriting Logic and its Applications
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter

Narciso Martí-Oliet
Proceedings of the Fifth International Workshop on Rewriting Logic and its Applications
WRLA-2004, 2005.

TCS
no DBLP info
Scholar
Full names Links ISxN
@proceedings{WRLA-2004,
	editor        = "Narciso Martí-Oliet",
	journal       = "{Electronic Notes in Theoretical Computer Science}",
	title         = "{Proceedings of the Fifth International Workshop on Rewriting Logic and its Applications}",
	volume        = 117,
	year          = 2005,
}

Contents (19 items)

WRLA-2004-Lopez-FraguasRV05 #constraints #functional #logic programming #revisited
Constraint Functional Logic Programming Revisited (FJLF, MRA, RdVV), pp. 5–50.
WRLA-2004-CirsteaFK05 #calculus #constraints
A rho-Calculus of Explicit Constraint Application (HC, GF, CK), pp. 51–67.
WRLA-2004-StumpBBHK05
From Rogue to MicroRogue (AS, RB, JCB, JH, BK), pp. 69–87.
WRLA-2004-LiquoriW05 #calculus #polymorphism #type checking #type inference
The Polymorphic Rewriting-calculus: [Type Checking vs. Type Inference] (LL, BW), pp. 89–111.
WRLA-2004-PalominoP05 #maude #model checking #proving
Proving VLRL Action Properties with the Maude Model Checker (MP, IP), pp. 113–133.
WRLA-2004-Wang05 #calculus #maude #model checking #μ-calculus
μ-Calculus Model Checking in Maude (BYW), pp. 135–152.
WRLA-2004-MeseguerT05 #analysis #encryption #protocol #reachability #using #verification
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
WRLA-2004-CervesatoS05 #dependent type #logic #representation #specification
Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types (IC, MOS), pp. 183–207.
WRLA-2004-CirsteaMR05 #java #programming #protocol #rule-based #verification
Rule-based Programming in Java For Protocol Verification (HC, PEM, AR), pp. 209–227.
WRLA-2004-DenkerT05 #dependence
Formal Checklists for Remote Agent Dependability (GD, CLT), pp. 229–248.
WRLA-2004-ArrighiD05
A Computational Definition of the Notion of Vectorial Space (PA, GD), pp. 249–261.
WRLA-2004-DuranEL05 #evaluation #maude
New Evaluation Commands for Maude Within Full Maude (FD, SE, SL), pp. 263–284.
WRLA-2004-OlveczkyM05 #maude #realtime
Real-Time Maude 2.1 (PCÖ, JM), pp. 285–314.
WRLA-2004-MasonT05 #framework #interactive #maude #named #platform
IOP: The InterOperability Platform & IMaude: An Interactive Extension of Maude (IAM, CLT), pp. 315–333.
WRLA-2004-CenciarelliTT05 #graph grammar
Ambient Graph Rewriting (PC, IT, AT), pp. 335–351.
WRLA-2004-CiobanuL05 #communication #concurrent
Communicating Concurrent Objects in HiddenCCS (GC, DL), pp. 353–373.
WRLA-2004-JohnsenOA05 #concurrent #runtime
A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls (EBJ, OO, EWA), pp. 375–392.
WRLA-2004-BragaM05 #composition #semantics
Modular Rewriting Semantics in Practice (CB, JM), pp. 393–416.
WRLA-2004-Marti-OlietMV05 #maude #towards
Towards a Strategy Language for Maude (NMO, JM, AV), pp. 417–441.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.