Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Eike Ritter
@article{DBLP:journals/corr/abs-2302-09031, author = {David J. Pym and Eike Ritter and Edmund Robinson}, title = {Categorical Proof-Theoretic Semantics}, journal = {CoRR}, volume = {abs/2302.09031}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09031}, doi = {10.48550/ARXIV.2302.09031}, eprinttype = {arXiv}, eprint = {2302.09031}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/KhanABRR18, author = {Imran Khan and Zahid Anwar and Behzad Bordbar and Eike Ritter and Habib{-}ur Rehman}, title = {A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {4}, pages = {942--954}, year = {2018}, url = {https://doi.org/10.1109/TCC.2016.2560161}, doi = {10.1109/TCC.2016.2560161}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/KhanABRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArapinisMRR17, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Dermot Ryan}, title = {Analysis of privacy in mobile telephony systems}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {5}, pages = {491--523}, year = {2017}, url = {https://doi.org/10.1007/s10207-016-0338-9}, doi = {10.1007/S10207-016-0338-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ArapinisMRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/ArapinisLRR17, author = {Myrto Arapinis and Jia Liu and Eike Ritter and Mark Ryan}, title = {Stateful applied pi calculus: Observational equivalence and labelled bisimilarity}, journal = {J. Log. Algebraic Methods Program.}, volume = {89}, pages = {95--149}, year = {2017}, url = {https://doi.org/10.1016/j.jlamp.2017.03.001}, doi = {10.1016/J.JLAMP.2017.03.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/ArapinisLRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DenzelRR17, author = {Michael Denzel and Mark Ryan and Eike Ritter}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {A Malware-Tolerant, Self-Healing Industrial Control System Framework}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {46--60}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_4}, doi = {10.1007/978-3-319-58469-0\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/DenzelRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/PaivaR16, author = {Valeria de Paiva and Eike Ritter}, editor = {Mario R. F. Benevides and Ren{\'{e}} Thiemann}, title = {Fibrational Modal Type Theory}, booktitle = {Proceedings of the Tenth Workshop on Logical and Semantic Frameworks, with Applications, {LSFA} 2015, Natal, Brazil, August 31 - September 1, 2015}, series = {Electronic Notes in Theoretical Computer Science}, volume = {323}, pages = {143--161}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.entcs.2016.06.010}, doi = {10.1016/J.ENTCS.2016.06.010}, timestamp = {Wed, 05 Feb 2020 13:51:47 +0100}, biburl = {https://dblp.org/rec/journals/entcs/PaivaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YasminRW14, author = {Rehana Yasmin and Eike Ritter and Guilin Wang}, title = {Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {5}, pages = {453--465}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0224-7}, doi = {10.1007/S10207-013-0224-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/YasminRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArapinisPRR14, author = {Myrto Arapinis and Joshua Phillips and Eike Ritter and Mark Dermot Ryan}, title = {StatVerif: Verification of stateful processes}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {743--821}, year = {2014}, url = {https://doi.org/10.3233/JCS-140501}, doi = {10.3233/JCS-140501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArapinisPRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/PymRR14, author = {David J. Pym and Eike Ritter and Edmund Robinson}, title = {A proof-theoretic analysis of the classical propositional matrix method}, journal = {J. Log. Comput.}, volume = {24}, number = {1}, pages = {283--301}, year = {2014}, url = {https://doi.org/10.1093/logcom/exs045}, doi = {10.1093/LOGCOM/EXS045}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/PymRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ArapinisMRR14, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Ryan}, title = {Privacy through Pseudonymity in Mobile Telephony Systems}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/privacy-through-pseudonymity-mobile-telephony-systems}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ArapinisMRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/ArapinisLRR14, author = {Myrto Arapinis and Jia Liu and Eike Ritter and Mark Ryan}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Stateful Applied Pi Calculus}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {22--41}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_2}, doi = {10.1007/978-3-642-54792-8\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/ArapinisLRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KoleiniRR14, author = {Masoud Koleini and Eike Ritter and Mark Ryan}, title = {Verification of agent knowledge in dynamic access control policies}, journal = {CoRR}, volume = {abs/1401.4730}, year = {2014}, url = {http://arxiv.org/abs/1401.4730}, eprinttype = {arXiv}, eprint = {1401.4730}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KoleiniRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/KoleiniRR13, author = {Masoud Koleini and Eike Ritter and Mark Ryan}, editor = {Nir Piterman and Scott A. Smolka}, title = {Model Checking Agent Knowledge in Dynamic Access Control Policies}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 19th International Conference, {TACAS} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7795}, pages = {448--462}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36742-7\_31}, doi = {10.1007/978-3-642-36742-7\_31}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/KoleiniRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YasminRW12, author = {Rehana Yasmin and Eike Ritter and Guilin Wang}, title = {An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {1}, pages = {126--133}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.126}, doi = {10.1587/TRANSINF.E95.D.126}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YasminRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArapinisMRRGRB12, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Ryan and Nico Golde and Kevin Redon and Ravishankar Borgaonkar}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {New privacy issues in mobile telephony: fix and verification}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {205--216}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382221}, doi = {10.1145/2382196.2382221}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArapinisMRRGRB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SmartR12, author = {Matt Smart and Eike Ritter}, editor = {Stefan Katzenbeisser and Edgar R. Weippl and L. Jean Camp and Melanie Volkamer and Mike K. Reiter and Xinwen Zhang}, title = {Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing}, booktitle = {Trust and Trustworthy Computing - 5th International Conference, {TRUST} 2012, Vienna, Austria, June 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7344}, pages = {19--33}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30921-2\_2}, doi = {10.1007/978-3-642-30921-2\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/SmartR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/SmartR11, author = {Matt Smart and Eike Ritter}, editor = {Jose M. Alcaraz Calero and Laurence Tianruo Yang and F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and Luis Javier Garc{\'{\i}}a{-}Villalba and Xiaolin Andy Li and Yan Wang}, title = {True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing}, booktitle = {Autonomic and Trusted Computing - 8th International Conference, {ATC} 2011, Banff, Canada, September 2-4, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6906}, pages = {187--202}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23496-5\_14}, doi = {10.1007/978-3-642-23496-5\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/atc/SmartR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArapinisRR11, author = {Myrto Arapinis and Eike Ritter and Mark Dermot Ryan}, title = {StatVerif: Verification of Stateful Processes}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {33--47}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.10}, doi = {10.1109/CSF.2011.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArapinisRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-2066, author = {Myrto Arapinis and Loretta Ilaria Mancini and Eike Ritter and Mark Ryan}, title = {Formal Analysis of {UMTS} Privacy}, journal = {CoRR}, volume = {abs/1109.2066}, year = {2011}, url = {http://arxiv.org/abs/1109.2066}, eprinttype = {arXiv}, eprint = {1109.2066}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-2066.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/YasminRW10, author = {Rehana Yasmin and Eike Ritter and Guilin Wang}, title = {An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {882--889}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.165}, doi = {10.1109/CIT.2010.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/YasminRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArapinisCRR10, author = {Myrto Arapinis and Tom Chothia and Eike Ritter and Mark Ryan}, title = {Analysing Unlinkability and Anonymity Using the Applied Pi Calculus}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {107--121}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.15}, doi = {10.1109/CSF.2010.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArapinisCRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/ArapinisCDFGKMRRSUY09, author = {Myrto Arapinis and Muffy Calder and Louise A. Dennis and Michael Fisher and Philip D. Gray and Savas Konur and Alice Miller and Eike Ritter and Mark Ryan and Sven Schewe and Chris Unsworth and Rehana Yasmin}, title = {Towards the Verification of Pervasive Systems}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {22}, year = {2009}, url = {https://doi.org/10.14279/tuj.eceasst.22.315}, doi = {10.14279/TUJ.ECEASST.22.315}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/ArapinisCDFGKMRRSUY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SmartR09, author = {Matt Smart and Eike Ritter}, editor = {Atul Prakash and Indranil Gupta}, title = {Remote Electronic Voting with Revocable Anonymity}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {39--54}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_5}, doi = {10.1007/978-3-642-10772-6\_5}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/SmartR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArapinisCRR09, author = {Myrto Arapinis and Tom Chothia and Eike Ritter and Mark Ryan}, title = {Untraceability in the applied pi-calculus}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402514}, doi = {10.1109/ICITST.2009.5402514}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acs/MaiettiMPR05, author = {Maria Emilia Maietti and Paola Maneggia and Valeria de Paiva and Eike Ritter}, title = {Relating Categorical Semantics for Intuitionistic Linear Logic}, journal = {Appl. Categorical Struct.}, volume = {13}, number = {1}, pages = {1--36}, year = {2005}, url = {https://doi.org/10.1007/s10485-004-3134-z}, doi = {10.1007/S10485-004-3134-Z}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acs/MaiettiMPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MukhamedovKR05, author = {Aybek Mukhamedov and Steve Kremer and Eike Ritter}, editor = {Andrew S. Patrick and Moti Yung}, title = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {255--269}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_23}, doi = {10.1007/11507840\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/galop/PymR05, author = {David J. Pym and Eike Ritter}, editor = {Dan R. Ghica and Guy McCusker}, title = {A games semantics for reductive logic and proof-search}, booktitle = {1st Workshop on Games for Logic and Programming Languages, GALOP@ETAPS 2005, Edinburgh, UK, 2-3 April 2005}, pages = {107--123}, year = {2005}, timestamp = {Thu, 25 Jun 2020 16:30:03 +0200}, biburl = {https://dblp.org/rec/conf/galop/PymR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0010820, author = {David J. Pym and Eike Ritter}, title = {Reductive logic and proof-search - proof theory, semantics, and control}, series = {Oxford logic guides}, volume = {45}, publisher = {Oxford University Press}, year = {2004}, isbn = {978-0-19-852633-9}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0010820.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/AlechinaMPR01, author = {Natasha Alechina and Michael Mendler and Valeria de Paiva and Eike Ritter}, editor = {Laurent Fribourg}, title = {Categorical and Kripke Semantics for Constructive {S4} Modal Logic}, booktitle = {Computer Science Logic, 15th International Workshop, {CSL} 2001. 10th Annual Conference of the EACSL, Paris, France, September 10-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2142}, pages = {292--307}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44802-0\_21}, doi = {10.1007/3-540-44802-0\_21}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/AlechinaMPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igpl/GhaniPR00, author = {Neil Ghani and Valeria de Paiva and Eike Ritter}, title = {Linear Explicit Substitutions}, journal = {Log. J. {IGPL}}, volume = {8}, number = {1}, pages = {7--31}, year = {2000}, url = {https://doi.org/10.1093/jigpal/8.1.7}, doi = {10.1093/JIGPAL/8.1.7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/igpl/GhaniPR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/RitterPW00, author = {Eike Ritter and David J. Pym and Lincoln A. Wallen}, title = {Proof-terms for classical and intuitionistic resolution}, journal = {J. Log. Comput.}, volume = {10}, number = {2}, pages = {173--207}, year = {2000}, url = {https://doi.org/10.1093/logcom/10.2.173}, doi = {10.1093/LOGCOM/10.2.173}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/RitterPW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/RitterPW00, author = {Eike Ritter and David J. Pym and Lincoln A. Wallen}, title = {On the intuitionistic force of classical search}, journal = {Theor. Comput. Sci.}, volume = {232}, number = {1-2}, pages = {299--333}, year = {2000}, url = {https://doi.org/10.1016/S0304-3975(99)00178-4}, doi = {10.1016/S0304-3975(99)00178-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/RitterPW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/MaiettiPR00, author = {Maria Emilia Maietti and Valeria de Paiva and Eike Ritter}, editor = {Jerzy Tiuryn}, title = {Categorical Models for Intuitionistic and Linear Type Theory}, booktitle = {Foundations of Software Science and Computation Structures, Third International Conference, {FOSSACS} 2000, Held as Part of the Joint European Conferences on Theory and Practice of Software,ETAPS 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1784}, pages = {223--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-46432-8\_15}, doi = {10.1007/3-540-46432-8\_15}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/MaiettiPR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/GhaniPR99, author = {Neil Ghani and Valeria de Paiva and Eike Ritter}, editor = {Wolfgang Thomas}, title = {Categorical Models of Explicit Substitutions}, booktitle = {Foundations of Software Science and Computation Structure, Second International Conference, FoSSaCS'99, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99, Amsterdam, The Netherlands, March 22-28, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1578}, pages = {197--211}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49019-1\_14}, doi = {10.1007/3-540-49019-1\_14}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/GhaniPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tlca/Ritter99, author = {Eike Ritter}, editor = {Jean{-}Yves Girard}, title = {Characterising Explicit Substitutions which Preserve Termination}, booktitle = {Typed Lambda Calculi and Applications, 4th International Conference, TLCA'99, L'Aquila, Italy, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1581}, pages = {325--339}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48959-2\_23}, doi = {10.1007/3-540-48959-2\_23}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/tlca/Ritter99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GhaniPR98, author = {Neil Ghani and Valeria de Paiva and Eike Ritter}, editor = {Kim Guldstrand Larsen and Sven Skyum and Glynn Winskel}, title = {Explicit Substitutions for Constructive Necessity}, booktitle = {Automata, Languages and Programming, 25th International Colloquium, ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1443}, pages = {743--754}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055098}, doi = {10.1007/BFB0055098}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/GhaniPR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/RitterP97, author = {Eike Ritter and Valeria de Paiva}, editor = {Pierpaolo Degano and Roberto Gorrieri and Alberto Marchetti{-}Spaccamela}, title = {On Explicit Substitution and Names (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1256}, pages = {248--258}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63165-8\_182}, doi = {10.1007/3-540-63165-8\_182}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/RitterP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/RitterPW96, author = {Eike Ritter and David J. Pym and Lincoln A. Wallen}, editor = {Michael A. McRobbie and John K. Slaney}, title = {Proof-Terms for Classical and Intuitionistic Resolution (Extended Abstract)}, booktitle = {Automated Deduction - CADE-13, 13th International Conference on Automated Deduction, New Brunswick, NJ, USA, July 30 - August 3, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1104}, pages = {17--31}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61511-3\_66}, doi = {10.1007/3-540-61511-3\_66}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/RitterPW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tableaux/RitterPW96, author = {Eike Ritter and David J. Pym and Lincoln A. Wallen}, editor = {Pierangelo Miglioli and Ugo Moscato and Daniele Mundici and Mario Ornaghi}, title = {On the Intuitionistic Force of Classical Search (Extended Abstract)}, booktitle = {Theorem Proving with Analytic Tableaux and Related Methods, 5th International Workshop, {TABLEAUX} '96, Terrasini, Palermo, Italy, May 15-17, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1071}, pages = {295--311}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61208-4\_19}, doi = {10.1007/3-540-61208-4\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/tableaux/RitterPW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tlca/RitterP95, author = {Eike Ritter and Andrew M. Pitts}, editor = {Mariangiola Dezani{-}Ciancaglini and Gordon D. Plotkin}, title = {A Fully Abstract Translation between a Lambda-Calculus with Reference Types and Standard {ML}}, booktitle = {Typed Lambda Calculi and Applications, Second International Conference on Typed Lambda Calculi and Applications, {TLCA} '95, Edinburgh, UK, April 10-12, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {902}, pages = {397--413}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0014067}, doi = {10.1007/BFB0014067}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/tlca/RitterP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Ritter94, author = {Eike Ritter}, title = {Categorical Abstract Machines for Higher-Order Typed lambda-Calculi}, journal = {Theor. Comput. Sci.}, volume = {136}, number = {1}, pages = {125--162}, year = {1994}, url = {https://doi.org/10.1016/0304-3975(94)00125-3}, doi = {10.1016/0304-3975(94)00125-3}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Ritter94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/OngR93, author = {C.{-}H. Luke Ong and Eike Ritter}, editor = {Egon B{\"{o}}rger and Yuri Gurevich and Karl Meinke}, title = {A Generic Strong Normalization Argument: Application to the Calculus of Constructions}, booktitle = {Computer Science Logic, 7th Workshop, {CSL} '93, Swansea, United Kingdom, September 13-17, 1993, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {832}, pages = {261--279}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/BFb0049336}, doi = {10.1007/BFB0049336}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/csl/OngR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/Ritter93, author = {Eike Ritter}, editor = {Egon B{\"{o}}rger and Yuri Gurevich and Karl Meinke}, title = {Normalization for Typed Lambda Calculi with Explicit Substitution}, booktitle = {Computer Science Logic, 7th Workshop, {CSL} '93, Swansea, United Kingdom, September 13-17, 1993, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {832}, pages = {295--304}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/BFb0049338}, doi = {10.1007/BFB0049338}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csl/Ritter93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hoa/NesiPR93, author = {Monica Nesi and Valeria de Paiva and Eike Ritter}, editor = {Jan Heering and Karl Meinke and Bernhard M{\"{o}}ller and Tobias Nipkow}, title = {Rewriting Properties of Combinators for Rudimentary Linear Logic}, booktitle = {Higher-Order Algebra, Logic, and Term Rewriting, First International Workshop, {HOA} '93, Amsterdam, The Netherlands, September 23-24, 1993, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {816}, pages = {256--275}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58233-9\_12}, doi = {10.1007/3-540-58233-9\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/hoa/NesiPR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.