You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This Festschrift was published in honor of Andre Scedrov on the occasion of his 65th birthday. The 11 technical papers and 3 short papers included in this volume show the many transformative discoveries made by Andre Scedrov in the areas of linear logic and structural proof theory; formal reasoning for networked systems; and foundations of information security emphasizing cryptographic protocols. These papers are authored by researchers around the world, including North America, Russia, Europe, and Japan, that have been directly or indirectly impacted by Andre Scedrov. The chapter “A Small Remark on Hilbert's Finitist View of Divisibility and Kanovich-Okada-Scedrov's Logical Analysis of Real-Time Systems” is available open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the refereed proceedings of the Second Theory of Cryptography Conference, TCC 2005, held in Cambridge, MA, USA in February 2005. The 32 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on hardness amplification and error correction, graphs and groups, simulation and secure computation, security of encryption, steganography and zero knowledge, secure computation, quantum cryptography and universal composability, cryptographic primitives and security, encryption and signatures, and information theoretic cryptography.
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needs Discusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies
A Sobolev gradient of a real-valued functional is a gradient of that functional taken relative to the underlying Sobolev norm. This book shows how descent methods using such gradients allow a unified treatment of a wide variety of problems in differential equations. Equal emphasis is placed on numerical and theoretical matters. Several concrete applications are made to illustrate the method. These applications include (1) Ginzburg-Landau functionals of superconductivity, (2) problems of transonic flow in which type depends locally on nonlinearities, and (3) minimal surface problems. Sobolev gradient constructions rely on a study of orthogonal projections onto graphs of closed densely defined linear transformations from one Hilbert space to another. These developments use work of Weyl, von Neumann and Beurling.
Although the theory of object-oriented programming languages is far from complete, this book brings together the most important contributions to its development to date, focusing in particular on how advances in type systems and semantic models can contribute to new language designs.The fifteen chapters are divided into five parts: Objects and Subtypes, Type Inference, Coherence, Record Calculi, and Inheritance. The chapters are organized approximately in order of increasing complexity of the programming language constructs they consider - beginning with variations on Pascal- and Algol-like languages, developing the theory of illustrative record object models, and concluding with research di...
A classic exposition of a branch of mathematical logic that uses category theory, this text is suitable for advanced undergraduates and graduate students and accessible to both philosophically and mathematically oriented readers.
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019. Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.
Practical Foundations collects the methods of construction of the objects of twentieth-century mathematics. Although it is mainly concerned with a framework essentially equivalent to intuitionistic Zermelo-Fraenkel logic, the book looks forward to more subtle bases in categorical type theory and the machine representation of mathematics. Each idea is illustrated by wide-ranging examples, and followed critically along its natural path, transcending disciplinary boundaries between universal algebra, type theory, category theory, set theory, sheaf theory, topology and programming. Students and teachers of computing, mathematics and philosophy will find this book both readable and of lasting value as a reference work.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this book constitutes the refereed proceedings of the 24th International Conference on Formal Grammar, FG 2019, held in Riga, Latvia, in August 2019, in conjunction with the 31st European Summer School in Logic, Language and Information, ESSLI 2019. The 7 full papers presented were carefully reviewed and selected from 11 submissions. They present new and original research on formal grammar, mathematical linguistics, and the application of formal and mathematical methods to the study of natural language and focus on topics such as formal and computational phonology, morphology, syntax, semantics, and pragmatics; model-theoretic and proof-theoretic methods in linguistics; logical aspects of linguistic structure; constraint-based and resource-sensitive approaches to grammar; learnability of formal grammar; integration of stochastic and symbolic models of grammar; foundational, methodological, and architectural issues in grammar and linguistics; and mathematical foundations of statistical approaches to linguistic analysis.
A so-called "effective" algorithm may require arbitrarily large finite amounts of time and space resources, and hence may not be practical in the real world. A "feasible" algorithm is one which only requires a limited amount of space and/or time for execution; the general idea is that a feasible algorithm is one which may be practical on today's or at least tomorrow's computers. There is no definitive analogue of Church's thesis giving a mathematical definition of feasibility; however, the most widely studied mathematical model of feasible computability is polynomial-time computability. Feasible Mathematics includes both the study of feasible computation from a mathematical and logical point...