You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Formal Aspects in Security and Trust, FAST 2008, held under the auspices of IFIP WG 1.7 in Malaga, Spain, in October 2008 as a satellite event of 13th European Symposium on Research in Computer Security. The 20 revised papers presented were carefully reviewed and selected from 59 submissions. The papers focus of formal aspects in security, trust and reputation, security protocol design and analysis, logics for security and trust, trust-based reasoning, distributed trust management systems, digital asset protection, data protection, privacy and id management issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, Web/grid services security/trust/privacy, security and risk assessment, resource and access control, as well as case studies.
This volume is based on the 2008 Clifford Lectures on Information Flow in Physics, Geometry and Logic and Computation, held March 12-15, 2008, at Tulane University in New Orleans, Louisiana. The varying perspectives of the researchers are evident in the topics represented in the volume, including mathematics, computer science, quantum physics and classical and quantum information. A number of the articles address fundamental questions in quantum information and related topics in quantum physics, using abstract categorical and domain-theoretic models for quantum physics to reason about such systems and to model spacetime. Readers can expect to gain added insight into the notion of information flow and how it can be understood in many settings. They also can learn about new approaches to modeling quantum mechanics that provide simpler and more accessible explanations of quantum phenomena, which don't require the arcane aspects of Hilbert spaces and the cumbersome notation of bras and kets.
The 2008 TUB-SJTU joint workshop on “Autonomous Systems – Self-Organization, Management, and Control” was held on October 6, 2008 at Shanghai Jiao Tong University, Shanghai, China. The workshop, sponsored by Shanghai Jiao Tong University and Technical University of Berlin brought together scientists and researchers from both universities to present and discuss the latest progress on autonomous systems and its applications in diverse areas. Autonomous systems are designed to integrate machines, computing, sensing, and software to create intelligent systems capable of interacting with the complexities of the real world. Autonomous systems represent the physical embodiment of machine intelligence. Topics of interest include, but are not limited to theory and modeling for autonomous systems; organization of autonomous systems; learning and perception; complex systems; multi-agent systems; robotics and control; applications of autonomous systems.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information this book constitutes the refereed proceedings of the of the 29th International Workshop on Logic, Language, Information, and Computation, WoLLIC 2023, held in Halifax, NS, Canada, during July 11–14, 2023. The 24 full papers (21 contributed, 3 invited) included in this book were carefully reviewed and selected from 46 submissions. The book also contains the abstracts for the 7 invited talks and 4 tutorials presented at WoLLIC 2023. The WoLLIC conference series aims at fostering interdisciplinary research in pure and applied logic.
This book presents the refereed proceedings of the 14th International Symposium on Formal Methods, FM 2006, held in Hamilton, Canada, August 2006. The book presents 36 revised full papers together with 2 invited contributions and extended abstracts of 7 invited industrial presentations, organized in topical sections on interactive verification, formal modelling of systems, real time, industrial experience, specification and refinement, programming languages, algebra, formal modelling of systems, and more.
This Festschrift was published in honor of Andre Scedrov on the occasion of his 65th birthday. The 11 technical papers and 3 short papers included in this volume show the many transformative discoveries made by Andre Scedrov in the areas of linear logic and structural proof theory; formal reasoning for networked systems; and foundations of information security emphasizing cryptographic protocols. These papers are authored by researchers around the world, including North America, Russia, Europe, and Japan, that have been directly or indirectly impacted by Andre Scedrov. The chapter “A Small Remark on Hilbert's Finitist View of Divisibility and Kanovich-Okada-Scedrov's Logical Analysis of Real-Time Systems” is available open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.
Explores quantum computation from the perspective of the branch of theoretical computer science known as semantics.
This Festschrift volume, published in honor of Samson Abramsky, contains contributions written by some of his colleagues, former students, and friends. In celebration of the 60th birthday of Samson Abramsky, a conference was held in Oxford, UK, during May 28-30, 2010. The papers in this volume represent his manifold contributions to semantics, logic, games, and quantum mechanics.