You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Programming languages and system architectures are at the frontiers of two different worlds. The conference on which this book is based was an adventure in a land where the two worlds - the formal world of algorithms and the physical world of electronic circuits - interact. The participants explored this land under the guidance of internationally renowned researchers such as Butler W. Lampson, Susan Graham, Jan L.A. van de Snepscheut, and C.A.R. Hoare, all of whom gave invited papers. The volume includes these papers together with sixteen session papers. Subjects of special interest include: programing language design and history, programming environments, programming methods, operating systems, compiler construction, and innovative system architectures.
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2004, held in Marseille, France in March 2004. The 13 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are devoted to trends in smart card research, operating systems and virtual machine technologies, secure platforms, security, application validation, verification, and formal modeling and formal methods.
This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.
This book constitutes the refereed proceedings of the 15th International SPIN workshop on Model Checking Software, SPIN 2008, held in Los Angeles, CA, USA, in August 2008. The 17 revised full papers presented together with 1 tool paper and 4 invited talks were carefully reviewed and selected from 41 submissions. The main focus of the workshop series is software systems, including models and programs. The papers cover theoretical and algorithmic foundations as well as tools for software model checking and foster interactions and exchanges of ideas with related areas in software engineering, such as static analysis, dynamic analysis, and testing.
This book constitutes the thoroughly refereed post-proceedings of the International Symposium on Trustworthy Global Computing, TGC 2005, held in Edinburgh, UK, in April 2005, and colocated with the events of ETAPS 2005. The 11 revised full papers presented together with 8 papers contributed by the invited speakers were carefully selected during 2 rounds of reviewing and improvement from numerous submissions. Topical issues covered by the workshop are resource usage, language-based security, theories of trust and authentication, privacy, reliability and business integrity access control and mechanisms for enforcing them, models of interaction and dynamic components management, language concepts and abstraction mechanisms, test generators, symbolic interpreters, type checkers, finite state model checkers, theorem provers, software principles to support debugging and verification.
The origin of this book goes back to the Dagstuhl seminar on Logic for System Engineering, organized during the first week of March 1997 by S. Jiihnichen, J. Loeckx, and M. Wirsing. During that seminar, after Egon Borger's talk on How to Use Abstract State Machines in Software Engineering, Wolfram Schulte, at the time a research assistant at the University of Ulm, Germany, questioned whether ASMs provide anything special as a scientifically well founded and rigorous yet simple and industrially viable framework for high level design and analysis of complex systems, and for natural refinements of models to executable code. Wolfram Schulte argued, referring to his work with K. Achatz on A Forma...
This book constitutes the refereed proceedings of the Third International Symposium on Foundations of Information and Knowledge Systems, FoIKS 2004 held at Wilheminenburg Castle, Austria in February 2004. The 18 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 64 submissions. Among the topics covered are data integration, data security, logic programming and databases, relational reasoning, database queries, higher-order data models, updates, database views, OLAP, belief modeling, fixpoint computations, interaction schemes, plan databases, etc.
This book presents a survey of the state-of-the-art on techniques for dealing with aliasing in object-oriented programming. It marks the 20th anniversary of the paper The Geneva Convention On The Treatment of Object Aliasing by John Hogg, Doug Lea, Alan Wills, Dennis de Champeaux and Richard Holt. The 22 revised papers were carefully reviewed to ensure the highest quality.The contributions are organized in topical sections on the Geneva convention, ownership, concurrency, alias analysis, controlling effects, verification, programming languages, and visions.