Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gérard Cécé
@inproceedings{DBLP:conf/lics/Cece17, author = {G{\'{e}}rard C{\'{e}}c{\'{e}}}, title = {Foundation for a series of efficient simulation algorithms}, booktitle = {32nd Annual {ACM/IEEE} Symposium on Logic in Computer Science, {LICS} 2017, Reykjavik, Iceland, June 20-23, 2017}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/LICS.2017.8005069}, doi = {10.1109/LICS.2017.8005069}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Cece17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-01826, author = {G{\'{e}}rard C{\'{e}}c{\'{e}}}, title = {Foundation for a series of efficient simulation algorithms}, journal = {CoRR}, volume = {abs/1709.01826}, year = {2017}, url = {http://arxiv.org/abs/1709.01826}, eprinttype = {arXiv}, eprint = {1709.01826}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-01826.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-1638, author = {G{\'{e}}rard C{\'{e}}c{\'{e}}}, title = {Three Simulation Algorithms for Labelled Transition Systems}, journal = {CoRR}, volume = {abs/1301.1638}, year = {2013}, url = {http://arxiv.org/abs/1301.1638}, eprinttype = {arXiv}, eprint = {1301.1638}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-1638.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-3489, author = {G{\'{e}}rard C{\'{e}}c{\'{e}}}, title = {Bisimulations over {DLTS} in O(m.log n)-time}, journal = {CoRR}, volume = {abs/1302.3489}, year = {2013}, url = {http://arxiv.org/abs/1302.3489}, eprinttype = {arXiv}, eprint = {1302.3489}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-3489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlt/CeceG11, author = {G{\'{e}}rard C{\'{e}}c{\'{e}} and Alain Giorgetti}, editor = {Giancarlo Mauri and Alberto Leporati}, title = {Simulations over Two-Dimensional On-Line Tessellation Automata}, booktitle = {Developments in Language Theory - 15th International Conference, {DLT} 2011, Milan, Italy, July 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6795}, pages = {141--152}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22321-1\_13}, doi = {10.1007/978-3-642-22321-1\_13}, timestamp = {Sat, 09 Apr 2022 12:37:59 +0200}, biburl = {https://dblp.org/rec/conf/dlt/CeceG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/CeceHM08, author = {G{\'{e}}rard C{\'{e}}c{\'{e}} and Pierre{-}Cyrille H{\'{e}}am and Yann Mainier}, title = {Efficiency of automata in semi-commutation verification techniques}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {42}, number = {2}, pages = {197--215}, year = {2008}, url = {https://doi.org/10.1051/ita:2007029}, doi = {10.1051/ITA:2007029}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/CeceHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/CeceHM08, author = {G{\'{e}}rard C{\'{e}}c{\'{e}} and Pierre{-}Cyrille H{\'{e}}am and Yann Mainier}, title = {Cl{\^{o}}tures transitives de semi-commutations et model-checking r{\'{e}}gulier}, journal = {Tech. Sci. Informatiques}, volume = {27}, number = {1-2}, pages = {7--28}, year = {2008}, url = {https://doi.org/10.3166/tsi.27.7-28}, doi = {10.3166/TSI.27.7-28}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/CeceHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CeceF05, author = {G{\'{e}}rard C{\'{e}}c{\'{e}} and Alain Finkel}, title = {Verification of programs with half-duplex communication}, journal = {Inf. Comput.}, volume = {202}, number = {2}, pages = {166--190}, year = {2005}, url = {https://doi.org/10.1016/j.ic.2005.05.006}, doi = {10.1016/J.IC.2005.05.006}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/CeceF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fasec/OehlCKS02, author = {Fr{\'{e}}d{\'{e}}ric Oehl and G{\'{e}}rard C{\'{e}}c{\'{e}} and Olga Kouchnarenko and David Sinclair}, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Automatic Approximation for the Verification of Cryptographic Protocols}, booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, pages = {33--48}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-40981-6\_5}, doi = {10.1007/978-3-540-40981-6\_5}, timestamp = {Wed, 15 Sep 2021 13:43:48 +0200}, biburl = {https://dblp.org/rec/conf/fasec/OehlCKS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/CeceF97, author = {G{\'{e}}rard C{\'{e}}c{\'{e}} and Alain Finkel}, editor = {Orna Grumberg}, title = {Programs with Quasi-Stable Channels are Effectively Recognizable (Extended Abstract)}, booktitle = {Computer Aided Verification, 9th International Conference, {CAV} '97, Haifa, Israel, June 22-25, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1254}, pages = {304--315}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63166-6\_31}, doi = {10.1007/3-540-63166-6\_31}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/CeceF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/CeceFI96, author = {G{\'{e}}rard C{\'{e}}c{\'{e}} and Alain Finkel and S. Purushothaman Iyer}, title = {Unreliable Channels are Easier to Verify Than Perfect Channels}, journal = {Inf. Comput.}, volume = {124}, number = {1}, pages = {20--31}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0003}, doi = {10.1006/INCO.1996.0003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/CeceFI96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/CeceFI94, author = {G{\'{e}}rard C{\'{e}}c{\'{e}} and Alain Finkel and S. Purushothaman Iyer}, editor = {David S. Wile}, title = {Duplication, Insertion and Lossiness Errors in Unreliable Communication Channels}, booktitle = {Proceedings of the Second {ACM} {SIGSOFT} Symposium on Foundations of Software Engineering, {SIGSOFT} 1994, New Orleans, Louisiana, USA, December 6-9, 1994}, pages = {35--43}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/193173.195292}, doi = {10.1145/193173.195292}, timestamp = {Tue, 27 Jul 2021 17:16:40 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/CeceFI94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.