Bodei / Priami / Ferrari | Programming Languages with Applications to Biology and Security | Buch | 978-3-319-25526-2 | sack.de

Buch, Englisch, Band 9465, 375 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5854 g

Reihe: Lecture Notes in Computer Science

Bodei / Priami / Ferrari

Programming Languages with Applications to Biology and Security

Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday
1. Auflage 2015
ISBN: 978-3-319-25526-2
Verlag: Springer International Publishing

Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday

Buch, Englisch, Band 9465, 375 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5854 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-319-25526-2
Verlag: Springer International Publishing


This Festschrift volume is published in honor of Pierpaolo Degano on the occasion of his 65th birthday and is the outcome of a colloquium held in Pisa, Italy, in June 2015. Pierpaolo Degano has worked on a large variety of topics including formal program semantics, concurrency theory, systems biology and security.

The volume contains 22 refereed papers and one extended abstract, including personal memoirs and regular research papers by close collaborators and friends and a laudatio illustrating his distinguished career and his main scientific contributions. The papers deal with the main research topics explored by Pierpaolo Degano and those still under his investigation. 

Bodei / Priami / Ferrari Programming Languages with Applications to Biology and Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Pierpaolo Degano.- Pierpaolo, a great friend.- Distributed Authorization with Distributed Grammars.- Causal Trees, fi nally.- Limited Disclosure and Locality in Graphs.- Hoare Logic for Disjunctive Information Flow.- Alice and Bob: Reconciling Formal Models and Implementation.- Asynchronous Traces and Open Petri Nets.- Compliance in Behavioural Contracts: A Brief Survey.- Safe Adaptation Through Implicit Effect Coercion.- Validation of Decentralised Smart Contracts through Game Theory and Formal Methods.- Static Evidences for Attack Reconstruction.- A Declarative View of Signaling Pathways.- Securing Android with Local Policies.- Global Protocol Implementations via Attribute-Based Communication.- Symbolic Protocol Analysis with Disequality Constraints modulo Equational Theories.- Language Representability of Finite P/T Nets.- Soulmate Algorithms.- Active Knowledge, LuNA and Literacy for Oncoming Centuries.- There Are Two Sides to Every Question: Controller vs Attacker.- From Safety Critical Java Programs to Timed Process Models.- When to Move to Transfer Nets.- L: An Imperative DSL to Stochastically Simulate Biological Systems.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.