Kirchner, Hélène.
Kirchner, Hélène, 1952-....
Kirchner, H. (Hélène)
Kirchner, Hélène, wiskunde
Hélène Kirchner chercheur
VIAF ID: 27156885 (Personal)
Permalink: http://viaf.org/viaf/27156885
Preferred Forms
- 100 0 _ ‡a Hélène Kirchner ‡c chercheur
- 200 _ | ‡a Kirchner ‡b Hélène ‡f 1952-....
-
-
- 100 1 0 ‡a Kirchner, H. ‡q (Hélène)
-
- 100 1 _ ‡a Kirchner, Hélène ‡d 1952-
-
- 100 1 _ ‡a Kirchner, Hélène, ‡d 1952-....
-
-
- 100 1 _ ‡a Kirchner, Hélène
- 100 1 _ ‡a Kirchner, Hélène
-
4xx's: Alternate Name Forms (10)
Works
Title | Sources |
---|---|
Algebraic and logic programming... | |
Algebraic methodology and software technology : 9th international conference, AMAST 2002, Saint-Gilles-les-Bains, Reunion Island, France, September 9-13, 2002 : proceedings | |
AMAST 2002 | |
Analyse de codes auto-modifiants pour la sécurité logicielle | |
Analyse de programmes malveillants par abstraction de comportements | |
Automated deduction - CADE-15 : 15th International Conference on Automated Deduction, Lindau, Germany, July 5-10, 1998 : proceedings | |
CAAP '96 | |
Combinaison de résolutions de contraintes | |
Combination of constraint solvers. | |
Contraintes d'ordre et automates d'arbres pour les preuves de terminaison | |
Controlling Rewriting : Study and Implementation of a Strategy Formalism. | |
Déduction avec sortes ordonnées et égalités | |
Deduction with symbolic constaints | |
Design of decision procedures by combination and saturation. | |
Embedding security policies into pervasive computing systems. | |
Frontiers of combining systems : third international workshop, FroCoS 2000, Nancy, France, March 22-24, 2000 : proceedings | |
Intégration de politiques de sécurité dans les systèmes ubiquitaires | |
Malware Analysis by Behavior Abstraction. | |
Order-sorted deduction with equalities. | |
Ordering constraints and tree automata for proving termination. | |
Preuves par complétion dans les variétés d'algèbres | |
Production Rule Systems and Rewriting calculus. | |
Proof by completion in algevra varieties. | |
Proof by induction in sequent calculus modulo. | |
Réécriture et modularité pour les politiques de sécurité | |
Rewriting and modularity for security policies. | |
Rewriting, computation and proof : essays dedicated to Jean-Pierre Jouannaud on the occasion of his 60th birthday | |
Rule-based programming and strategies for automated generation of detailed kinetic models for gas phase combustion of polycyclic hydrocarbon molecules. | |
Self-modifying code analysis for software security. | |
Shematization of infinite sets of rewrite rules : applications to the divergence of completion processes | |
Study of the k-bounded term rewriting strategy. | |
Système de règles de production et calcul de réécriture | |
Terminaison de la réécriture sous stratégies | |
Trees in algebra and programming - CAAP'96 : 21st international colloquium, Linköping, Sweden, April 22-24, 1996 : proceedings | |
Vérification formelle de protocoles de routage sécurisés. | |
Where Social Networks, Graph Rewriting and Visualisation Meet : Application to Network Generation and Information Diffusion |