default search action
BibTeX records: Hubert Comon-Lundh
@inproceedings{DBLP:conf/ccs/ComonJS20, author = {Hubert Comon and Charlie Jacomme and Guillaume Scerri}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Oracle Simulation: {A} Technique for Protocol Composition with Long Term Shared Secrets}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1427--1444}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417229}, doi = {10.1145/3372297.3417229}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ComonJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ChevalCD17, author = {Vincent Cheval and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, title = {A procedure for deciding symbolic equivalence between sets of constraint systems}, journal = {Inf. Comput.}, volume = {255}, pages = {94--125}, year = {2017}, url = {https://doi.org/10.1016/j.ic.2017.05.004}, doi = {10.1016/J.IC.2017.05.004}, timestamp = {Mon, 31 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/ChevalCD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ComonK17, author = {Hubert Comon and Adrien Koutsos}, title = {Formal Computational Unlinkability Proofs of {RFID} Protocols}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {100--114}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.9}, doi = {10.1109/CSF.2017.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ComonK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ComonK17, author = {Hubert Comon and Adrien Koutsos}, title = {Formal Computational Unlinkability Proofs of {RFID} Protocols}, journal = {CoRR}, volume = {abs/1705.02296}, year = {2017}, url = {http://arxiv.org/abs/1705.02296}, eprinttype = {arXiv}, eprint = {1705.02296}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ComonK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BursucCD14, author = {Sergiu Bursuc and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, title = {Deducibility constraints and blind signatures}, journal = {Inf. Comput.}, volume = {238}, pages = {106--127}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.006}, doi = {10.1016/J.IC.2014.07.006}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BursucCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BanaC14, author = {Gergei Bana and Hubert Comon{-}Lundh}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Computationally Complete Symbolic Attacker for Equivalence Properties}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {609--620}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660276}, doi = {10.1145/2660267.2660276}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BanaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Comon-LundhCS13, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier and Guillaume Scerri}, editor = {Maria Paola Bonacina}, title = {Tractable Inference Systems: An Extension with a Deducibility Predicate}, booktitle = {Automated Deduction - {CADE-24} - 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7898}, pages = {91--108}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38574-2\_6}, doi = {10.1007/978-3-642-38574-2\_6}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/Comon-LundhCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Comon-Lundh13, author = {Hubert Comon{-}Lundh}, title = {{LICS:} Logic in Computer Security - Some Attacker's Models and Related Decision Problems}, booktitle = {28th Annual {ACM/IEEE} Symposium on Logic in Computer Science, {LICS} 2013, New Orleans, LA, USA, June 25-28, 2013}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/LICS.2013.68}, doi = {10.1109/LICS.2013.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Comon-Lundh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/Comon-LundhM12, author = {Hubert Comon{-}Lundh and Catherine Meadows}, title = {Special Issue on Security and Rewriting Foreword}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {133--134}, year = {2012}, url = {https://doi.org/10.1007/s10817-011-9242-1}, doi = {10.1007/S10817-011-9242-1}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/Comon-LundhM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Comon-LundhHKS12, author = {Hubert Comon{-}Lundh and Masami Hagiya and Yusuke Kawamoto and Hideki Sakurada}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Computational Soundness of Indistinguishability Properties without Computable Parsing}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {63--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_5}, doi = {10.1007/978-3-642-29101-2\_5}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/Comon-LundhHKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/Comon-LundhCS12, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier and Guillaume Scerri}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Security Proof with Dishonest Keys}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {149--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_9}, doi = {10.1007/978-3-642-28641-4\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/Comon-LundhCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BanaC12, author = {Gergei Bana and Hubert Comon{-}Lundh}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Towards Unconditional Soundness: Computationally Complete Symbolic Attacker}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {189--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_11}, doi = {10.1007/978-3-642-28641-4\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/BanaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/Comon-LundhD12, author = {Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {Tobias Nipkow and Orna Grumberg and Benedikt Hauptmann}, title = {Formal Security Proofs}, booktitle = {Software Safety and Security - Tools for Analysis and Verification}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {33}, pages = {26--63}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-028-4-26}, doi = {10.3233/978-1-61499-028-4-26}, timestamp = {Wed, 04 Mar 2020 14:10:38 +0100}, biburl = {https://dblp.org/rec/series/natosec/Comon-LundhD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Comon-LundhCS12, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier and Guillaume Scerri}, title = {Security proof with dishonest keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2012}, url = {http://eprint.iacr.org/2012/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Comon-LundhCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaC12, author = {Gergei Bana and Hubert Comon{-}Lundh}, title = {Towards Unconditional Soundness: Computationally Complete Symbolic Attacker}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2012}, url = {http://eprint.iacr.org/2012/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChevalCD11, author = {Vincent Cheval and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Trace equivalence decision: negative tests and non-determinism}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {321--330}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046744}, doi = {10.1145/2046707.2046744}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChevalCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/Comon-LundhC11, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier}, editor = {Thomas Schwentick and Christoph D{\"{u}}rr}, title = {How to prove security of communication protocols? {A} discussion on the soundness of formal models w.r.t. computational ones}, booktitle = {28th International Symposium on Theoretical Aspects of Computer Science, {STACS} 2011, March 10-12, 2011, Dortmund, Germany}, series = {LIPIcs}, volume = {9}, pages = {29--44}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2011}, url = {https://doi.org/10.4230/LIPIcs.STACS.2011.29}, doi = {10.4230/LIPICS.STACS.2011.29}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/stacs/Comon-LundhC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Comon-LundhDM11, author = {Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune and Jonathan K. Millen}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Constraint solving techniques and enriching the model with equational theories}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {35--61}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-35}, doi = {10.3233/978-1-60750-714-7-35}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Comon-LundhDM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Comon-LundhKM11, author = {Hubert Comon{-}Lundh and Ralf K{\"{u}}sters and Catherine Meadows}, title = {Security and Rewriting (Dagstuhl Seminar 11332)}, journal = {Dagstuhl Reports}, volume = {1}, number = {8}, pages = {53--66}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.8.53}, doi = {10.4230/DAGREP.1.8.53}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Comon-LundhKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/Comon-LundhCZ10, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier and Eugen Zalinescu}, title = {Deciding security properties for cryptographic protocols. application to key cycles}, journal = {{ACM} Trans. Comput. Log.}, volume = {11}, number = {2}, pages = {9:1--9:42}, year = {2010}, url = {https://doi.org/10.1145/1656242.1656244}, doi = {10.1145/1656242.1656244}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/Comon-LundhCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/ChevalCD10, author = {Vincent Cheval and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {J{\"{u}}rgen Giesl and Reiner H{\"{a}}hnle}, title = {Automating Security Analysis: Symbolic Equivalence of Constraint Systems}, booktitle = {Automated Reasoning, 5th International Joint Conference, {IJCAR} 2010, Edinburgh, UK, July 16-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6173}, pages = {412--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14203-1\_35}, doi = {10.1007/978-3-642-14203-1\_35}, timestamp = {Wed, 25 Sep 2019 18:19:14 +0200}, biburl = {https://dblp.org/rec/conf/cade/ChevalCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/Comon-LundhKS09, author = {Hubert Comon{-}Lundh and Yusuke Kawamoto and Hideki Sakurada}, title = {Computational and Symbolic Anonymity in an Unbounded Network}, journal = {{JSIAM} Lett.}, volume = {1}, pages = {28--31}, year = {2009}, url = {https://doi.org/10.14495/jsiaml.1.28}, doi = {10.14495/JSIAML.1.28}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/Comon-LundhKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/BursucCD09, author = {Sergiu Bursuc and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {Anupam Datta}, title = {Deducibility Constraints}, booktitle = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, pages = {24--38}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4\_3}, doi = {10.1007/978-3-642-10622-4\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/BursucCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/AbadiBC09, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet and Hubert Comon{-}Lundh}, editor = {Ahmed Bouajjani and Oded Maler}, title = {Models and Proofs of Protocol Security: {A} Progress Report}, booktitle = {Computer Aided Verification, 21st International Conference, {CAV} 2009, Grenoble, France, June 26 - July 2, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5643}, pages = {35--49}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02658-4\_5}, doi = {10.1007/978-3-642-02658-4\_5}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/AbadiBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psec/AffeldtC09, author = {Reynald Affeldt and Hubert Comon{-}Lundh}, editor = {V{\'{e}}ronique Cortier and Claude Kirchner and Mitsuhiro Okada and Hideki Sakurada}, title = {Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables}, booktitle = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration}, series = {Lecture Notes in Computer Science}, volume = {5458}, pages = {1--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02002-5\_1}, doi = {10.1007/978-3-642-02002-5\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/psec/AffeldtC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/BursucC09, author = {Sergiu Bursuc and Hubert Comon{-}Lundh}, editor = {Ralf Treinen}, title = {Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions}, booktitle = {Rewriting Techniques and Applications, 20th International Conference, {RTA} 2009, Bras{\'{\i}}lia, Brazil, June 29 - July 1, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5595}, pages = {133--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02348-4\_10}, doi = {10.1007/978-3-642-02348-4\_10}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/BursucC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmcs/Comon-LundhJP08, author = {Hubert Comon{-}Lundh and Florent Jacquemard and Nicolas Perrin}, title = {Visibly Tree Automata with Memory and Constraints}, journal = {Log. Methods Comput. Sci.}, volume = {4}, number = {2}, year = {2008}, url = {https://doi.org/10.2168/LMCS-4(2:8)2008}, doi = {10.2168/LMCS-4(2:8)2008}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmcs/Comon-LundhJP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Comon-Lundh08, author = {Hubert Comon{-}Lundh}, editor = {Alessandro Armando and Peter Baumgartner and Gilles Dowek}, title = {Challenges in the Automated Verification of Security Protocols}, booktitle = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008, Sydney, Australia, August 12-15, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5195}, pages = {396--409}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71070-7\_34}, doi = {10.1007/978-3-540-71070-7\_34}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/Comon-Lundh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Comon-LundhC08, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Computational soundness of observational equivalence}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {109--118}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455786}, doi = {10.1145/1455770.1455786}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Comon-LundhC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/Comon-Lundh08, author = {Hubert Comon{-}Lundh}, editor = {Ramesh Hariharan and Madhavan Mukund and V. Vinay}, title = {About models of security protocols}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2008, December 9-11, 2008, Bangalore, India}, series = {LIPIcs}, volume = {2}, pages = {352--356}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2008}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1766}, doi = {10.4230/LIPICS.FSTTCS.2008.1766}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/Comon-Lundh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0804-3065, author = {Hubert Comon{-}Lundh and Florent Jacquemard and Nicolas Perrin}, title = {Visibly Tree Automata with Memory and Constraints}, journal = {CoRR}, volume = {abs/0804.3065}, year = {2008}, url = {http://arxiv.org/abs/0804.3065}, eprinttype = {arXiv}, eprint = {0804.3065}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0804-3065.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BursucCD07, author = {Sergiu Bursuc and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {Hubert Comon{-}Lundh and Claude Kirchner and H{\'{e}}l{\`{e}}ne Kirchner}, title = {Deducibility Constraints, Equational Theory and Electronic Money}, booktitle = {Rewriting, Computation and Proof, Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {4600}, pages = {196--212}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73147-4\_10}, doi = {10.1007/978-3-540-73147-4\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BursucCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/Comon-LundhJP07, author = {Hubert Comon{-}Lundh and Florent Jacquemard and Nicolas Perrin}, editor = {Helmut Seidl}, title = {Tree Automata with Memory, Visibility and Structural Constraints}, booktitle = {Foundations of Software Science and Computational Structures, 10th International Conference, {FOSSACS} 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2007, Braga, Portugal, March 24-April 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4423}, pages = {168--182}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71389-0\_13}, doi = {10.1007/978-3-540-71389-0\_13}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/Comon-LundhJP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/BursucCD07, author = {Sergiu Bursuc and Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {Wolfgang Thomas and Pascal Weil}, title = {Associative-Commutative Deducibility Constraints}, booktitle = {{STACS} 2007, 24th Annual Symposium on Theoretical Aspects of Computer Science, Aachen, Germany, February 22-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4393}, pages = {634--645}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70918-3\_54}, doi = {10.1007/978-3-540-70918-3\_54}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/BursucCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2007jouannaud, editor = {Hubert Comon{-}Lundh and Claude Kirchner and H{\'{e}}l{\`{e}}ne Kirchner}, title = {Rewriting, Computation and Proof, Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {4600}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73147-4}, doi = {10.1007/978-3-540-73147-4}, isbn = {978-3-540-73146-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2007jouannaud.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0708-3564, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier and Eugen Zalinescu}, title = {Deciding security properties for cryptographic protocols. Application to key cycles}, journal = {CoRR}, volume = {abs/0708.3564}, year = {2007}, url = {http://arxiv.org/abs/0708.3564}, eprinttype = {arXiv}, eprint = {0708.3564}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0708-3564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/BernatC06, author = {Vincent Bernat and Hubert Comon{-}Lundh}, editor = {Mitsu Okada and Ichiro Satoh}, title = {Normal Proofs in Intruder Theories}, booktitle = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4435}, pages = {151--166}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77505-8\_12}, doi = {10.1007/978-3-540-77505-8\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/BernatC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ComonC05, author = {Hubert Comon and V{\'{e}}ronique Cortier}, title = {Tree automata with one memory set constraints and cryptographic protocols}, journal = {Theor. Comput. Sci.}, volume = {331}, number = {1}, pages = {143--214}, year = {2005}, url = {https://doi.org/10.1016/j.tcs.2004.09.036}, doi = {10.1016/J.TCS.2004.09.036}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ComonC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asm/Comon-Lundh05, author = {Hubert Comon{-}Lundh}, title = {Normal Attacks on Security Protocols}, booktitle = {Proceedings of the 12th International Workshop on Abstract State Machines, {ASM} 2005, March 8-11, 2005, Paris, France}, pages = {70}, year = {2005}, url = {http://www.univ-paris12.fr/lacl/dima/asm05/comon.ps}, timestamp = {Thu, 26 Jul 2007 15:03:11 +0200}, biburl = {https://dblp.org/rec/conf/asm/Comon-Lundh05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Comon-LundhD05, author = {Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune}, editor = {J{\"{u}}rgen Giesl}, title = {The Finite Variant Property: How to Get Rid of Some Algebraic Properties}, booktitle = {Term Rewriting and Applications, 16th International Conference, {RTA} 2005, Nara, Japan, April 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3467}, pages = {294--307}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32033-3\_22}, doi = {10.1007/978-3-540-32033-3\_22}, timestamp = {Wed, 25 Sep 2019 18:23:35 +0200}, biburl = {https://dblp.org/rec/conf/rta/Comon-LundhD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Comon-LundhC04, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier}, title = {Security properties: two agents are sufficient}, journal = {Sci. Comput. Program.}, volume = {50}, number = {1-3}, pages = {51--71}, year = {2004}, url = {https://doi.org/10.1016/j.scico.2003.12.002}, doi = {10.1016/J.SCICO.2003.12.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/Comon-LundhC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/Comon-Lundh04, author = {Hubert Comon{-}Lundh}, editor = {Igor Walukiewicz}, title = {Intruder Theories (Ongoing Work)}, booktitle = {Foundations of Software Science and Computation Structures, 7th International Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2987}, pages = {1--4}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24727-2\_1}, doi = {10.1007/978-3-540-24727-2\_1}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/Comon-Lundh04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ComonJ03, author = {Hubert Comon and Florent Jacquemard}, title = {Ground reducibility is EXPTIME-complete}, journal = {Inf. Comput.}, volume = {187}, number = {1}, pages = {123--153}, year = {2003}, url = {https://doi.org/10.1016/S0890-5401(03)00134-2}, doi = {10.1016/S0890-5401(03)00134-2}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ComonJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ComonNNR03, author = {Hubert Comon and Paliath Narendran and Robert Nieuwenhuis and Micha{\"{e}}l Rusinowitch}, title = {Deciding the confluence of ordered term rewrite systems}, journal = {{ACM} Trans. Comput. Log.}, volume = {4}, number = {1}, pages = {33--55}, year = {2003}, url = {https://doi.org/10.1145/601775.601777}, doi = {10.1145/601775.601777}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ComonNNR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Comon-LundhT03, author = {Hubert Comon{-}Lundh and Ralf Treinen}, editor = {Nachum Dershowitz}, title = {Easy Intruder Deductions}, booktitle = {Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday}, series = {Lecture Notes in Computer Science}, volume = {2772}, pages = {225--242}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39910-0\_10}, doi = {10.1007/978-3-540-39910-0\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Comon-LundhT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/Comon-LundhC03, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier}, editor = {Pierpaolo Degano}, title = {Security Properties: Two Agents Are Sufficient}, booktitle = {Programming Languages and Systems, 12th European Symposium on Programming, {ESOP} 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2003, Warsaw, Poland, April 7-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2618}, pages = {99--113}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36575-3\_8}, doi = {10.1007/3-540-36575-3\_8}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/Comon-LundhC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Comon-LundhS03, author = {Hubert Comon{-}Lundh and Vitaly Shmatikov}, title = {Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or}, booktitle = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003), 22-25 June 2003, Ottawa, Canada, Proceedings}, pages = {271}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/LICS.2003.1210067}, doi = {10.1109/LICS.2003.1210067}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Comon-LundhS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Comon-LundhC03, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier}, editor = {Robert Nieuwenhuis}, title = {New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols}, booktitle = {Rewriting Techniques and Applications, 14th International Conference, {RTA} 2003, Valencia, Spain, June 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2706}, pages = {148--164}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44881-0\_12}, doi = {10.1007/3-540-44881-0\_12}, timestamp = {Sun, 02 Oct 2022 16:14:20 +0200}, biburl = {https://dblp.org/rec/conf/rta/Comon-LundhC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ComonGN01, author = {Hubert Comon and Guillem Godoy and Robert Nieuwenhuis}, title = {The Confluence of Ground Term Rewrite Systems is Decidable in Polynomial Time}, booktitle = {42nd Annual Symposium on Foundations of Computer Science, {FOCS} 2001, 14-17 October 2001, Las Vegas, Nevada, {USA}}, pages = {298--307}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SFCS.2001.959904}, doi = {10.1109/SFCS.2001.959904}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ComonGN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ComonCM01, author = {Hubert Comon and V{\'{e}}ronique Cortier and John Mitchell}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {682--693}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_56}, doi = {10.1007/3-540-48224-5\_56}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/ComonCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/RV01/Comon01, author = {Hubert Comon}, editor = {John Alan Robinson and Andrei Voronkov}, title = {Inductionless Induction}, booktitle = {Handbook of Automated Reasoning (in 2 volumes)}, pages = {913--962}, publisher = {Elsevier and {MIT} Press}, year = {2001}, url = {https://doi.org/10.1016/b978-044450813-3/50016-3}, doi = {10.1016/B978-044450813-3/50016-3}, timestamp = {Thu, 25 Jul 2019 12:26:00 +0200}, biburl = {https://dblp.org/rec/books/el/RV01/Comon01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cav/2001, editor = {G{\'{e}}rard Berry and Hubert Comon and Alain Finkel}, title = {Computer Aided Verification, 13th International Conference, {CAV} 2001, Paris, France, July 18-22, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2102}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44585-4}, doi = {10.1007/3-540-44585-4}, isbn = {3-540-42345-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccl/1999, editor = {Hubert Comon and Claude March{\'{e}} and Ralf Treinen}, title = {Constraints in Computational Logics: Theory and Applications, International Summer School, CCL'99 Gif-sur-Yvette, France, September 5-8, 1999, Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {2002}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45406-3}, doi = {10.1007/3-540-45406-3}, isbn = {3-540-41950-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccl/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Comon00, author = {Hubert Comon}, title = {Sequentiality, Monadic Second-Order Logic and Tree Automata}, journal = {Inf. Comput.}, volume = {157}, number = {1-2}, pages = {25--51}, year = {2000}, url = {https://doi.org/10.1006/inco.1999.2838}, doi = {10.1006/INCO.1999.2838}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Comon00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ComonN00, author = {Hubert Comon and Robert Nieuwenhuis}, title = {Induction=I-Axiomatization+First-Order Consistency}, journal = {Inf. Comput.}, volume = {159}, number = {1-2}, pages = {151--186}, year = {2000}, url = {https://doi.org/10.1006/inco.2000.2875}, doi = {10.1006/INCO.2000.2875}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/ComonN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/ComonC00, author = {Hubert Comon and V{\'{e}}ronique Cortier}, editor = {Peter Clote and Helmut Schwichtenberg}, title = {Flatness Is Not a Weakness}, booktitle = {Computer Science Logic, 14th Annual Conference of the EACSL, Fischbachau, Germany, August 21-26, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1862}, pages = {262--276}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44622-2\_17}, doi = {10.1007/3-540-44622-2\_17}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/ComonC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/constraints/ComonDJK99, author = {Hubert Comon and Mehmet Dincbas and Jean{-}Pierre Jouannaud and Claude Kirchner}, title = {A Methodological View of Constraint Solving}, journal = {Constraints An Int. J.}, volume = {4}, number = {4}, pages = {337--361}, year = {1999}, url = {https://doi.org/10.1023/A:1009868906501}, doi = {10.1023/A:1009868906501}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/constraints/ComonDJK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccl/ComonK99, author = {Hubert Comon and Claude Kirchner}, editor = {Hubert Comon and Claude March{\'{e}} and Ralf Treinen}, title = {Constraint Solving on Terms}, booktitle = {Constraints in Computational Logics: Theory and Applications, International Summer School, CCL'99 Gif-sur-Yvette, France, September 5-8, 1999, Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {2002}, pages = {47--103}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-45406-3\_2}, doi = {10.1007/3-540-45406-3\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/ccl/ComonK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/ComonJ99, author = {Hubert Comon and Yan Jurski}, editor = {Jos C. M. Baeten and Sjouke Mauw}, title = {Timed Automata and the Theory of Real Numbers}, booktitle = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1664}, pages = {242--257}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48320-9\_18}, doi = {10.1007/3-540-48320-9\_18}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/ComonJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Comon98, author = {Hubert Comon}, title = {Completion of Rewrite Systems with Membership Constraints. Part {I:} Deduction Rules}, journal = {J. Symb. Comput.}, volume = {25}, number = {4}, pages = {397--419}, year = {1998}, url = {https://doi.org/10.1006/jsco.1997.0185}, doi = {10.1006/JSCO.1997.0185}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Comon98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Comon98a, author = {Hubert Comon}, title = {Completion of Rewrite Systems with Membership Constraints. Part {II:} Constraint Solving}, journal = {J. Symb. Comput.}, volume = {25}, number = {4}, pages = {421--453}, year = {1998}, url = {https://doi.org/10.1006/jsco.1997.0186}, doi = {10.1006/JSCO.1997.0186}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Comon98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ComonJ98, author = {Hubert Comon and Yan Jurski}, editor = {Alan J. Hu and Moshe Y. Vardi}, title = {Multiple Counters Automata, Safety Analysis and Presburger Arithmetic}, booktitle = {Computer Aided Verification, 10th International Conference, {CAV} '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1427}, pages = {268--279}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0028751}, doi = {10.1007/BFB0028751}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/ComonJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ComonNNR98, author = {Hubert Comon and Paliath Narendran and Robert Nieuwenhuis and Micha{\"{e}}l Rusinowitch}, title = {Decision Problems in Ordered Rewriting}, booktitle = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis, Indiana, USA, June 21-24, 1998}, pages = {276--286}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/LICS.1998.705664}, doi = {10.1109/LICS.1998.705664}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ComonNNR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Comon98, author = {Hubert Comon}, editor = {Tobias Nipkow}, title = {About Proofs by Consistency (Abstract)}, booktitle = {Rewriting Techniques and Applications, 9th International Conference, RTA-98, Tsukuba, Japan, March 30 - April 1, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1379}, pages = {136--137}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0052366}, doi = {10.1007/BFB0052366}, timestamp = {Sat, 05 Sep 2020 18:07:52 +0200}, biburl = {https://dblp.org/rec/conf/rta/Comon98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ComonT97, author = {Hubert Comon and Ralf Treinen}, title = {The First-Order Theory of Lexicographic Path Orderings is Undecidable}, journal = {Theor. Comput. Sci.}, volume = {176}, number = {1-2}, pages = {67--87}, year = {1997}, url = {https://doi.org/10.1016/S0304-3975(96)00049-7}, doi = {10.1016/S0304-3975(96)00049-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ComonT97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/ComonJ97, author = {Hubert Comon and Yan Jurski}, editor = {Mogens Nielsen and Wolfgang Thomas}, title = {Higher-Order Matching and Tree Automata}, booktitle = {Computer Science Logic, 11th International Workshop, {CSL} '97, Annual Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1414}, pages = {157--176}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028013}, doi = {10.1007/BFB0028013}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/ComonJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ComonJ97, author = {Hubert Comon and Florent Jacquemard}, title = {Ground Reducibility is EXPTIME-Complete}, booktitle = {Proceedings, 12th Annual {IEEE} Symposium on Logic in Computer Science, Warsaw, Poland, June 29 - July 2, 1997}, pages = {26--34}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/LICS.1997.614922}, doi = {10.1109/LICS.1997.614922}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ComonJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rta/1997, editor = {Hubert Comon}, title = {Rewriting Techniques and Applications, 8th International Conference, RTA-97, Sitges, Spain, June 2-5, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1232}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-62950-5}, doi = {10.1007/3-540-62950-5}, isbn = {3-540-62950-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rta/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caap/BoudetC96, author = {Alexandre Boudet and Hubert Comon}, editor = {H{\'{e}}l{\`{e}}ne Kirchner}, title = {Diophantine Equations, Presburger Arithmetic and Finite Automata}, booktitle = {Trees in Algebra and Programming - CAAP'96, 21st International Colloquium, Link{\"{o}}ping, Sweden, April, 22-24, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1059}, pages = {30--43}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61064-2\_27}, doi = {10.1007/3-540-61064-2\_27}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/caap/BoudetC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/Comon95, author = {Hubert Comon}, title = {On Unification of Terms with Integer Exponents}, journal = {Math. Syst. Theory}, volume = {28}, number = {1}, pages = {67--88}, year = {1995}, url = {https://doi.org/10.1007/BF01294596}, doi = {10.1007/BF01294596}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mst/Comon95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ComonNR95, author = {Hubert Comon and Robert Nieuwenhuis and Albert Rubio}, title = {Orderings, AC-Theories and Symbolic Constraint Solving (Extended Abstract)}, booktitle = {Proceedings, 10th Annual {IEEE} Symposium on Logic in Computer Science, San Diego, California, USA, June 26-29, 1995}, pages = {375--385}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/LICS.1995.523272}, doi = {10.1109/LICS.1995.523272}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ComonNR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Comon95, author = {Hubert Comon}, title = {Sequentiality, Second Order Monadic Logic and Tree Automata}, booktitle = {Proceedings, 10th Annual {IEEE} Symposium on Logic in Computer Science, San Diego, California, USA, June 26-29, 1995}, pages = {508--517}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/LICS.1995.523285}, doi = {10.1109/LICS.1995.523285}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Comon95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/unif/Comon95, author = {Hubert Comon}, editor = {Robert Nieuwenhuis and Albert Rubio}, title = {Linear diophantine equations, Presburger arithmetic and finite automata}, booktitle = {9th International Workshop on Unification, {UNIF} 1995, Sitges, Spain, April 2-3, 1995}, pages = {13}, year = {1995}, timestamp = {Fri, 19 May 2023 16:00:29 +0200}, biburl = {https://dblp.org/rec/conf/unif/Comon95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ac/1993tr, editor = {Hubert Comon and Jean{-}Pierre Jouannaud}, title = {Term Rewriting, French Spring School of Theoretical Computer Science, Font Romeux, France, May 17-21, 1993, Advanced Course}, series = {Lecture Notes in Computer Science}, volume = {909}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-59340-3}, doi = {10.1007/3-540-59340-3}, isbn = {3-540-59340-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/1993tr.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ComonHJ94, author = {Hubert Comon and Marianne Haberstrau and Jean{-}Pierre Jouannaud}, title = {Syntacticness, Cycle-Syntacticness, and Shallow Theories}, journal = {Inf. Comput.}, volume = {111}, number = {1}, pages = {154--191}, year = {1994}, url = {https://doi.org/10.1006/inco.1994.1043}, doi = {10.1006/INCO.1994.1043}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ComonHJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ComonD94, author = {Hubert Comon and Catherine Delor}, title = {Equational Formulae with Membership Constraints}, journal = {Inf. Comput.}, volume = {112}, number = {2}, pages = {167--216}, year = {1994}, url = {https://doi.org/10.1006/inco.1994.1056}, doi = {10.1006/INCO.1994.1056}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ComonD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caap/ComonT94, author = {Hubert Comon and Ralf Treinen}, editor = {Sophie Tison}, title = {Ordering Constraints on Trees}, booktitle = {Trees in Algebra and Programming - CAAP'94, 19th International Colloquium, Edinburgh, UK, April 11-13, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {787}, pages = {1--14}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0017470}, doi = {10.1007/BFB0017470}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/caap/ComonT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/CaronCCDJ94, author = {Anne{-}C{\'{e}}cile Caron and Hubert Comon and Jean{-}Luc Coquid{\'{e}} and Max Dauchet and Florent Jacquemard}, editor = {Serge Abiteboul and Eli Shamir}, title = {Pumping, Cleaning and Symbolic Constraints Solving}, booktitle = {Automata, Languages and Programming, 21st International Colloquium, ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {820}, pages = {436--449}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58201-0\_88}, doi = {10.1007/3-540-58201-0\_88}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/CaronCCDJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/ComonJ94, author = {Hubert Comon and Florent Jacquemard}, editor = {Patrice Enjalbert and Ernst W. Mayr and Klaus W. Wagner}, title = {Ground Reducibility and Automata with Disequality Constraints}, booktitle = {{STACS} 94, 11th Annual Symposium on Theoretical Aspects of Computer Science, Caen, France, February 24-26, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {775}, pages = {151--162}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-57785-8\_138}, doi = {10.1007/3-540-57785-8\_138}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/ComonJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/lncs/Comon94, author = {Hubert Comon}, editor = {Andreas Podelski}, title = {Constraints in Term Algebras: An Overview of Constraint Solving Techniques}, booktitle = {Constraint Programming: Basics and Trends, Ch{\^{a}}tillon Spring School, Ch{\^{a}}tillon-sur-Seine, France, May 16 - 20, 1994, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {910}, pages = {62--67}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-59155-9\_4}, doi = {10.1007/3-540-59155-9\_4}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/journals/lncs/Comon94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Comon93, author = {Hubert Comon}, title = {Complete Axiomatizations of Some Quotient Term Algebras}, journal = {Theor. Comput. Sci.}, volume = {118}, number = {2}, pages = {167--191}, year = {1993}, url = {https://doi.org/10.1016/0304-3975(93)90108-6}, doi = {10.1016/0304-3975(93)90108-6}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Comon93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/Comon93, author = {Hubert Comon}, editor = {Maurice Nivat and Charles Rattray and Teodor Rus and Giuseppe Scollo}, title = {Constraints in Term Algebras (Short Survey)}, booktitle = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings of the Third International Conference on Methodology and Software Technology, University of Twente, Enschede, The Netherlands, 21-25 June, 1993}, series = {Workshops in Computing}, pages = {97--108}, publisher = {Springer}, year = {1993}, timestamp = {Tue, 18 Feb 2003 11:00:12 +0100}, biburl = {https://dblp.org/rec/conf/amast/Comon93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapsoft/BoudetC93, author = {Alexandre Boudet and Hubert Comon}, editor = {Marie{-}Claude Gaudel and Jean{-}Pierre Jouannaud}, title = {About the Theory of Tree Embedding}, booktitle = {TAPSOFT'93: Theory and Practice of Software Development, International Joint Conference CAAP/FASE, Orsay, France, April 13-17, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {668}, pages = {376--390}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-56610-4\_77}, doi = {10.1007/3-540-56610-4\_77}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/tapsoft/BoudetC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Comon92, author = {Hubert Comon}, editor = {Werner Kuich}, title = {Completion of Rewrite Systems with Membership Constraints}, booktitle = {Automata, Languages and Programming, 19th International Colloquium, ICALP92, Vienna, Austria, July 13-17, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {623}, pages = {392--403}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55719-9\_91}, doi = {10.1007/3-540-55719-9\_91}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Comon92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ComonHJ92, author = {Hubert Comon and Marianne Haberstrau and Jean{-}Pierre Jouannaud}, title = {Decidable Problems in Shallow Equational Theories (Extended Abstract)}, booktitle = {Proceedings of the Seventh Annual Symposium on Logic in Computer Science {(LICS} '92), Santa Cruz, California, USA, June 22-25, 1992}, pages = {255--265}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/LICS.1992.185538}, doi = {10.1109/LICS.1992.185538}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ComonHJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/ComonF92, author = {Hubert Comon and Maribel Fern{\'{a}}ndez}, editor = {Ivan M. Havel and V{\'{a}}clav Koubek}, title = {Negation Elimination in Equational Formulae}, booktitle = {Mathematical Foundations of Computer Science 1992, 17th International Symposium, MFCS'92, Prague, Czechoslovakia, August 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {629}, pages = {191--199}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55808-X\_17}, doi = {10.1007/3-540-55808-X\_17}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/ComonF92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ComonLS91, author = {Hubert Comon and Denis Lugiez and Philippe Schnoebelen}, title = {A Rewrite-Based Type Discipline for a Subset of Computer Algebra}, journal = {J. Symb. Comput.}, volume = {11}, number = {4}, pages = {349--368}, year = {1991}, url = {https://doi.org/10.1016/S0747-7171(08)80110-1}, doi = {10.1016/S0747-7171(08)80110-1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ComonLS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Comon91, author = {Hubert Comon}, editor = {Jean{-}Louis Lassez and Gordon D. Plotkin}, title = {Disunification: {A} Survey}, booktitle = {Computational Logic - Essays in Honor of Alan Robinson}, pages = {322--359}, publisher = {The {MIT} Press}, year = {1991}, timestamp = {Wed, 30 Mar 2016 17:34:58 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Comon91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Comon91, author = {Hubert Comon}, editor = {Javier Leach Albert and Burkhard Monien and Mario Rodr{\'{\i}}guez{-}Artalejo}, title = {Complete Axiomatizations of Some Quotient Term Algebras}, booktitle = {Automata, Languages and Programming, 18th International Colloquium, ICALP91, Madrid, Spain, July 8-12, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {510}, pages = {469--480}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54233-7\_156}, doi = {10.1007/3-540-54233-7\_156}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Comon91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/Comon90, author = {Hubert Comon}, title = {Solving Symbolic Ordering Constraints}, journal = {Int. J. Found. Comput. Sci.}, volume = {1}, number = {4}, pages = {387--412}, year = {1990}, url = {https://doi.org/10.1142/S0129054190000278}, doi = {10.1142/S0129054190000278}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/Comon90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Comon90, author = {Hubert Comon}, editor = {Mike Paterson}, title = {Equational Formulas in Order-Sorted Algebras}, booktitle = {Automata, Languages and Programming, 17th International Colloquium, ICALP90, Warwick University, England, UK, July 16-20, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {443}, pages = {674--688}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0032066}, doi = {10.1007/BFB0032066}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Comon90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Comon90, author = {Hubert Comon}, title = {Solving Inequations in Term Algebras (Extended Abstract)}, booktitle = {Proceedings of the Fifth Annual Symposium on Logic in Computer Science {(LICS} '90), Philadelphia, Pennsylvania, USA, June 4-7, 1990}, pages = {62--69}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/LICS.1990.113734}, doi = {10.1109/LICS.1990.113734}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Comon90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ComonL89, author = {Hubert Comon and Pierre Lescanne}, title = {Equational Problems and Disunification}, journal = {J. Symb. Comput.}, volume = {7}, number = {3/4}, pages = {371--425}, year = {1989}, url = {https://doi.org/10.1016/S0747-7171(89)80017-3}, doi = {10.1016/S0747-7171(89)80017-3}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ComonL89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Comon89, author = {Hubert Comon}, editor = {Nachum Dershowitz}, title = {Inductive Proofs by Specification Transformation}, booktitle = {Rewriting Techniques and Applications, 3rd International Conference, RTA-89, Chapel Hill, North Carolina, USA, April 3-5, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {355}, pages = {76--91}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-51081-8\_101}, doi = {10.1007/3-540-51081-8\_101}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/Comon89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Comon88, author = {Hubert Comon}, title = {Unification et disunification : th{\'{e}}orie et applications. (Unification and disunification in free algebras and in initial algebras : theory and applications)}, school = {Grenoble Institute of Technology, France}, year = {1988}, url = {https://tel.archives-ouvertes.fr/tel-00331263}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Comon88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alp/Comon88, author = {Hubert Comon}, editor = {Jan Grabowski and Pierre Lescanne and Wolfgang Wechler}, title = {An Effective Method for Handling Initial Algebras}, booktitle = {Algebraic and Logic Programming, International Workshop, Gaussig, GDR, November 14-18, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {343}, pages = {108--118}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-50667-5\_62}, doi = {10.1007/3-540-50667-5\_62}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/alp/Comon88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/CalmetCL86, author = {Jacques Calmet and Hubert Comon and Denis Lugiez}, editor = {Thomas Beth and Michael Clausen}, title = {Type Inference Using Unification in Computer Algebra}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 4th International Conference, AAECC-4, Karlsruhe, FRG, September 23-26, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {307}, pages = {25--28}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/BFb0039176}, doi = {10.1007/BFB0039176}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/CalmetCL86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Comon86, author = {Hubert Comon}, editor = {J{\"{o}}rg H. Siekmann}, title = {Sufficient Completness, Term Rewriting Systems and "Anti-Unification"}, booktitle = {8th International Conference on Automated Deduction, Oxford, England, July 27 - August 1, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {230}, pages = {128--140}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-16780-3\_85}, doi = {10.1007/3-540-16780-3\_85}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/Comon86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.