You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This Festschrift was published in honor of Catuscia Palamidessi on the occasion of her 60th birthday. It features 6 laudations, which are available in the front matter of the volume, and 25 papers by close collaborators and friends. The papers are organized in topical sections named: concurrency; logic and constraint programming; security and privacy; and models and puzzles. These contributions are a tribute to Catuscia Palamidessi’s intellectual depth, vision, passion for science, and tenacity in solving technical problems. They also reflect the breadth and impact of her work. Her scientific interests include, in chronological order, principles of programming languages, concurrency theory, security, and privacy.
Foundations of Information Technology in the Era of Network and Mobile Computing is presented in two distinct but interrelated tracks: -Algorithms, Complexity and Models of Computation; -Logic, Semantics, Specification and Verification. This volume contains 45 original and significant contributions addressing these foundational questions, as well as 4 papers by outstanding invited speakers. These papers were presented at the 2nd IFIP International Conference on Theoretical Computer Science (TCS 2002), which was held in conjunction with the 17th World Computer Congress, sponsored by the International Federation for Information Processing (IFIP), and which convened in Montréal, Québec, Canada in August 2002.
This volume constitutes the refereed proceedings of the 17th International Conference on Concurrency Theory. Thirty full papers are presented along with three important invited papers. Each of these papers was carefully reviewed by the editors. Topics include model checking, process calculi, minimization and equivalence checking, types, semantics, probability, bisimulation and simulation, real time, and formal languages.
This book constitutes the refereed proceedings of the 16th International Conference on Concurreny Theory, CONCUR 2005, held in San Francisco, CA, USA in August 2005. The 38 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 100 submissions. Among the topics covered are concurrency related aspects of models of computation, Petri nets, model checking, game semantics, process algebras, real-time systems, verification techniques, secrecy and authenticity, refinement, distributed programming, constraint logic programming, typing systems and algorithms, case studies, tools, and environment for programming and verification.
This volume contains the papers selected for presentation at the fifth European Symposium on Programming (ESOP '94), which was held jointly with the 19th Colloquium on Trees in Algebra and Programming (CAAP '94) in Edinburgh in April 1994. ESOP is devoted to fundamental issues in the specification, design and implementation of programming languages and systems. The scope of the symposium includes work on: software analysis, specification, transformation, development and verification/certification; programming paradigms (functional, logic, object-oriented, concurrent, etc.) and their combinations; programming language concepts, implementation techniques and semantics; software design methodologies; typing disciplines and typechecking algorithms; and programming support tools.
This Festschrift is dedicated to Jan Willem Klop on the occasion of his 60th birthday. The volume comprises a total of 23 scientific papers by close friends and colleagues, written specifically for this book. The papers are different in nature: some report on new research, others have the character of a survey, and again others are mainly expository. Every contribution has been thoroughly refereed at least twice. In many cases the first round of referee reports led to significant revision of the original paper, which was again reviewed. The articles especially focus upon the lambda calculus, term rewriting and process algebra, the fields to which Jan Willem Klop has made fundamental contributions.
This book constitutes the refereed proceedings of the 8th International Conference on Foundations of Software Science and Computation Structures, FOSSACS 2005, held in Edinburgh, UK in April 2005 as part of ETAPS. The 30 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on rule formats and bisimulation, probabilistic models, algebraic models, games and automata, language analysis, partial order models, logics, coalgebraic modal logics, and computational models.
Annotation This book constitutes the refereed proceedings of the 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, held in Lisbon, Portugal in July 2005. The 113 revised full papers presented together with abstracts of 5 invited talks were carefully reviewed and selected from 407 submissions. The papers address all current issues in theoretical computer science and are organized in topical sections on data structures, cryptography and complexity, cryptography and distributed systems, graph algorithms, security mechanisms, automata and formal languages, signature and message authentication, algorithmic game theory, automata and logic, computational algebra, cache-oblivious algorithms and algorithmic engineering, on-line algorithms, security protocols logic, random graphs, concurrency, encryption and related primitives, approximation algorithms, games, lower bounds, probability, algebraic computation and communication complexity, string matching and computational biology, quantum complexity, analysis and verification, geometry and load balancing, concrete complexity and codes, and model theory and model checking.
This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua’s most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several “symbolic approaches” to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.
This book presents 19 revised invited keynote lectures and revised tutorial lectures given at the 4th International Symposium on Formal Methods for Components and Objects, FMCO 2005, Amsterdam, November 2005. The book provides a unique combination of ideas on software engineering and formal methods that reflect the current interest in the application or development of formal methods for large scale software systems such as component-based systems and object systems.