You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 7th FIP WG 2.2 International Conference, TCS 2012, held in Amsterdam, The Netherlands, in September 2012. The 25 revised full papers presented, together with one invited talk, were carefully reviewed and selected from 48 submissions. New results of computation theory are presented and more broadly experts in theoretical computer science meet to share insights and ask questions about the future directions of the field.
The refereed proceedings of the 30th International Colloquium on Automata, Languages and Programming, ICALP 2003, held in Eindhoven, The Netherlands in June/July 2003. The 84 revised full papers presented together with six invited papers were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on algorithms, process algebra, approximation algorithms, languages and programming, complexity, data structures, graph algorithms, automata, optimization and games, graphs and bisimulation, online problems, verification, the Internet, temporal logic and model checking, graph problems, logic and lambda-calculus, data structures and algorithms, types and categories, probabilistic systems, sampling and randomness, scheduling, and geometric problems.
This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all t...
The goal of this book is to provide a comprehensive and systematic introduction to the important and highly applicable method of data refinement and the simulation methods used for proving its correctness. The authors concentrate in the first part on the general principles needed to prove data refinement correct. They begin with an explanation of the fundamental notions, showing that data refinement proofs reduce to proving simulation. The book's second part contains a detailed survey of important methods in this field, which are carefully analysed, and shown to be either incomplete, with counterexamples to their application, or to be always applicable whenever data refinement holds. This is shown by proving, for the first time, that all these methods can be described and analysed in terms of two simple notions: forward and backward simulation. The book is self-contained, going from advanced undergraduate level and taking the reader to the state of the art in methods for proving simulation.
There are more and more automated systems with which people are led to interact everyday. Their complexity increases, and badly designed systems may result in automation surprises. The contribution of this thesis is a formal analysis framework to assess whether a system is prone to potential automation surprises in an interaction.
This open access book constitutes the proceedings of the 25th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2022, which was held during April 4-6, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022. The 23 regular papers presented in this volume were carefully reviewed and selected from 77 submissions. They deal with research on theories and methods to support the analysis, integration, synthesis, transformation, and verification of programs and software systems.
Mobile Commerce (M-Commerce) comprises applications and services that are accessible from Internet-enabled mobile devices. It involves new technologies, services and business models. While it is different from traditional e-Commerce it can also be seen as an extension of e-Commerce in the sense that it, among others, makes e-Commerce available in a modern way to new application areas and to a new set of customers. The Internet is on its way to leave traces in all aspects of our life independently of where we are. Already today, mobile phones and PDAs are an indispensable part of our life as a source for all kinds of information and services and, especially, as our permanently available inter...
Dynamic Coalitions denote a temporary collaboration between different entities to achieve a common goal. A key feature that distinguishes Dynamic Coalitions from static coalitions is Dynamic Membership, where new members can join and others can leave after a coalition is set. This thesis studies workflows in Dynamic Coalitions, by analyzing their features, highlighting their unique characteristics and similarities to other workflows, and investigating their relation with Dynamic Membership. For this purpose, we use the formal model of Event Structures and extend it to faithfully model scenarios taken as use cases from healthcare. Event Structures allow for workflows modeling in general, and ...
Constraint Handling Rules (CHR) is both a theoretical formalism and a practical programming language. This book provides an overview of CHR research based on a reviewed selection of doctoral theses. After a basic introduction to CHR, the book presents results from three different areas of CHR research: compilation and optimization, execution strategies, and program analysis. The chapters offer in-depth treatises of selected subjects, supported by a wealth of examples. The book is ideal for master students, lecturers, and researchers.