Journal: Electronic Notes in Theoretical Computer Science

Volume 125, Issue 3

1 -- 2Wolfgang Ahrendt, Peter Baumgartner, Hans de Nivelle, Silvio Ranise, Cesare Tinelli. Preface
3 -- 12Clark Barrett, Jacob Donham. Combining SAT Methods with Non-Clausal Decision Heuristics
13 -- 23Sergey Berezin, Clark Barrett, Igor Shikanian, Marsha Chechik, Arie Gurfinkel, David L. Dill. A Practical Approach to Partial Functions in CVC Lite
25 -- 36Alessandro Armando, Claudio Castellini, Enrico Giunchiglia, Massimo Idini, Marco Maratea. TSAT++: an Open Platform for Satisfiability Modulo Theories
37 -- 51Pascal Fontaine, E. Pascal Gribomont. Combining Non-stably Infinite, Non-first Order Theories
53 -- 68Robert Klapper, Aaron Stump. Validated Proof-Producing Decision Procedures
69 -- 85Leonardo Mendonça de Moura, Harald Rueß, Natarajan Shankar. Justifying Equality
87 -- 101Simon Colton, Alison Pease. The TM System for Repairing Non-Theorems
103 -- 116Tjark Weber. Bounded Model Generation for Isabelle/HOL
117 -- 135Didier Galmiche, Daniel Méry. Resource Graphs and Countermodels in Resource Logics
137 -- 148Dominique Larchey-Wendling. Gödel-Dummett Counter-models through Matrix Computation
149 -- 164Jian Zhang, Zhuo Huang. Reducing Symmetries to Generate Easier SAT Instances

Volume 125, Issue 2

1 -- 3Maria Paola Bonacina, Thierry Boy de la Tour. Preface
5 -- 43Bernhard Gramlich. Strategic Issues, Problems and Challenges in Inductive Theorem Proving
45 -- 65Sayan Mitra, Myla Archer. PVS Strategies for Proving Abstraction Properties of Automata
67 -- 90Andreas Meier, Erica Melis. Failure Reasoning in Multiple-Strategy Proof Planning
91 -- 113Thierry Boy de la Tour, Prakash Countcham. An Isomorph-Free SEM-Like Enumeration of Models
115 -- 147Tatjana Lutovac, James Harland. Issues in the Analysis of Proof-Search Strategies in Sequential Presentations of Logics
149 -- 164Aaron Stump, Carsten Schürmann. Logical Semantics for the Rewriting Calculus

Volume 125, Issue 1

1 -- 0Alessandro Armando, Luca Viganò. Preface
3 -- 12Simon N. Foley. Believing the Integrity of a System: (Invited Talk)
13 -- 24Mike Bond, Jolyon Clulow. Extending Security Protocol Analysis: New Challenges
25 -- 41Hao Chen, John A. Clark, Jeremy L. Jacob. Synthesising Efficient and Effective Security Protocols
43 -- 54Christopher Lynch, Catherine Meadows. On the Relative Soundness of the Free Algebra Model for Public Key Encryption
55 -- 66Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani. Deciding the Security of Protocols with Commuting Public Key Encryption
67 -- 89Carlos Caleiro, Luca Viganò, David A. Basin. Metareasoning about Security Protocols using Distributed Temporal Logic
91 -- 108Alessandro Armando, Luca Compagna. An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
109 -- 124Laurent Mazaré. Satisfiability of Dolev-Yao Constraints
125 -- 144Graham Steel, Alan Bundy. Attacking Group Multicast Key Management Protocols Using Coral
145 -- 161Paul Hankes Drielsma, Sebastian Mödersheim. The ASW Protocol Revisited: A Unified View