You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Provides a sound basis in logic, and introduces logical frameworks used in modelling, specifying and verifying computer systems.
Software-intensive systems are today an integral part of many everyday products. Whilst they provide great benefits regarding ease of use and allow for new applications, they also impose enormous responsibilities. It is vital to ensure that such applicati
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The growing number of regulations, e.g., on information security, data protection, or privacy, implemented in increasingly digitized businesses can have an obstructive effect on the automated execution of business processes. Such security-related obstructions can particularly occur when an access control-based implementation of regulations blocks the execution of business processes. By handling obstructions, security in business processes is supposed to be improved. For this, the book presents a framewo...
This volume contains the proceedings of the second joint PAPM-PROBMIV Workshop, held at the University of Copenhagen, Denmark, July 25–26, 2002 as part of the Federated Logic Conference (FLoC 2002). The PAPM-PROBMIV workshop results from the combination of two wo- shops: PAPM (Process Algebras and Performance Modeling) and PROBMIV (Probabilistic Methods in Veri?cation). The aim of the joint workshop is to bring together the researchers working across the whole spectrum of techniques for the modeling, speci?cation, analysis, and veri?cation of probabilistic systems. Probability is widely used in the design and analysis of software and hardware systems, as a means to derive e?cient algorithm...
The papers of this volume focus on the foundational aspects of computer science, the thematic origin and stronghold of LNCS, under the title “Computing and Software Science: State of the Art and Perspectives”. They are organized in two parts: The first part, Computation and Complexity, presents a collection of expository papers on fashionable themes in algorithmics, optimization, and complexity. The second part, Methods, Languages and Tools for Future System Development, aims at sketching the methodological evolution that helps guaranteeing that future systems meet their increasingly critical requirements. Chapter 3 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Part I of this book is a practical introduction to working with the Isabelle proof assistant. It teaches you how to write functional programs and inductive definitions and how to prove properties about them in Isabelle’s structured proof language. Part II is an introduction to the semantics of imperative languages with an emphasis on applications like compilers and program analysers. The distinguishing feature is that all the mathematics has been formalised in Isabelle and much of it is executable. Part I focusses on the details of proofs in Isabelle; Part II can be read even without familiarity with Isabelle’s proof language, all proofs are described in detail but informally. The book teaches the reader the art of precise logical reasoning and the practical use of a proof assistant as a surgical tool for formal proofs about computer science artefacts. In this sense it represents a formal approach to computer science, not just semantics. The Isabelle formalisation, including the proofs and accompanying slides, are freely available online, and the book is suitable for graduate students, advanced undergraduate students, and researchers in theoretical computer science and logic.
This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.
There are more and more automated systems with which people are led to interact everyday. Their complexity increases, and badly designed systems may result in automation surprises. The contribution of this thesis is a formal analysis framework to assess whether a system is prone to potential automation surprises in an interaction.
This book constitutes the refereed proceedings of the 9th International Conference on Concurrency Theory, CONCUR'98, held in Nice, France, in September 1998. The 35 revised full papers presented were carefully selected from a total of 104 submissions. Also presented are five invited contributions. Among the topics covered are moduls of computation and semantic domains, process algebras, Petri Nets, event structures, real-time systems, hybrid systems, model checking, verification techniques, refinement, rewriting, typing systems and algorithms, etc..
This book constitutes the refereed proceedings of the 17th International Conference on Computer Aided Verification, CAV 2005, held in Edinburgh, Scotland, UK in July 2005. The 32 revised full papers presented together with 16 tool papers and 3 invited papers, as well as a report on a special tools competition were carefully reviewed and selected from 155 submissions. The papers cover all current issues in computer aided verification and model checking, ranging from foundational and methodological issues to the evaluation of major tools and systems.