Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Matthijs Melissen
@inproceedings{DBLP:journals/corr/JamrogaMS14, author = {Wojciech Jamroga and Matthijs Melissen and Henning Schnoor}, editor = {Fabio Mogavero and Aniello Murano and Moshe Y. Vardi}, title = {On Defendability of Security Properties}, booktitle = {Proceedings 2nd International Workshop on Strategic Reasoning, {SR} 2014, Grenoble, France, April 5-6, 2014}, series = {{EPTCS}}, volume = {146}, pages = {17--25}, year = {2014}, url = {https://doi.org/10.4204/EPTCS.146.3}, doi = {10.4204/EPTCS.146.3}, timestamp = {Sat, 30 Sep 2023 10:08:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JamrogaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prima/JamrogaMS13, author = {Wojciech Jamroga and Matthijs Melissen and Henning Schnoor}, editor = {Guido Boella and Edith Elkind and Bastin Tony Roy Savarimuthu and Frank Dignum and Martin K. Purvis}, title = {Defendable Security in Interaction Protocols}, booktitle = {{PRIMA} 2013: Principles and Practice of Multi-Agent Systems - 16th International Conference, Dunedin, New Zealand, December 1-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8291}, pages = {132--148}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-44927-7\_10}, doi = {10.1007/978-3-642-44927-7\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prima/JamrogaMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epia/JamrogaM11, author = {Wojciech Jamroga and Matthijs Melissen}, editor = {Luis Antunes and Helena Sofia Pinto}, title = {Doubtful Deviations and Farsighted Play}, booktitle = {Progress in Artificial Intelligence, 15th Portuguese Conference on Artificial Intelligence, {EPIA} 2011, Lisbon, Portugal, October 10-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7026}, pages = {506--520}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24769-9\_37}, doi = {10.1007/978-3-642-24769-9\_37}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/epia/JamrogaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JamrogaMM11, author = {Wojciech Jamroga and Sjouke Mauw and Matthijs Melissen}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Fairness in Non-Repudiation Protocols}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {122--139}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_10}, doi = {10.1007/978-3-642-29963-6\_10}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/stm/JamrogaMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KordyMMS10, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {245--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_17}, doi = {10.1007/978-3-642-17197-0\_17}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KordyMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1006-2732, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, title = {Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, journal = {CoRR}, volume = {abs/1006.2732}, year = {2010}, url = {http://arxiv.org/abs/1006.2732}, eprinttype = {arXiv}, eprint = {1006.2732}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1006-2732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fg/Melissen09, author = {Matthijs Melissen}, editor = {Philippe de Groote and Markus Egg and Laura Kallmeyer}, title = {The Generative Capacity of the Lambek-Grishin Calculus: {A} New Lower Bound}, booktitle = {Formal Grammar - 14th International Conference, {FG} 2009, Bordeaux, France, July 25-26, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5591}, pages = {118--132}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-20169-1\_8}, doi = {10.1007/978-3-642-20169-1\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/fg/Melissen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.