Verkauf durch Sack Fachmedien

Bodei / Priami / Ferrari

Programming Languages with Applications to Biology and Security

Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday

Medium: Buch
ISBN: 978-3-319-25526-2
Verlag: Springer International Publishing
Erscheinungstermin: 20.11.2015
Lieferfrist: bis zu 10 Tage

This Festschrift volume is published in honor of Pierpaolo Degano on the occasion of his 65th birthday and is the outcome of a colloquium held in Pisa, Italy, in June 2015. Pierpaolo Degano has worked on a large variety of topics including formal program semantics, concurrency theory, systems biology and security.

The volume contains 22 refereed papers and one extended abstract, including personal memoirs and regular research papers by close collaborators and friends and a laudatio illustrating his distinguished career and his main scientific contributions. The papers deal with the main research topics explored by Pierpaolo Degano and those still under his investigation. 


Produkteigenschaften


  • Artikelnummer: 9783319255262
  • Medium: Buch
  • ISBN: 978-3-319-25526-2
  • Verlag: Springer International Publishing
  • Erscheinungstermin: 20.11.2015
  • Sprache(n): Englisch
  • Auflage: 1. Auflage 2015
  • Serie: Lecture Notes in Computer Science
  • Produktform: Kartoniert
  • Gewicht: 5854 g
  • Seiten: 375
  • Format (B x H x T): 155 x 235 x 21 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Herausgeber

Pierpaolo Degano.- Pierpaolo, a great friend.- Distributed Authorization with Distributed Grammars.- Causal Trees, fi nally.- Limited Disclosure and Locality in Graphs.- Hoare Logic for Disjunctive Information Flow.- Alice and Bob: Reconciling Formal Models and Implementation.- Asynchronous Traces and Open Petri Nets.- Compliance in Behavioural Contracts: A Brief Survey.- Safe Adaptation Through Implicit Effect Coercion.- Validation of Decentralised Smart Contracts through Game Theory and Formal Methods.- Static Evidences for Attack Reconstruction.- A Declarative View of Signaling Pathways.- Securing Android with Local Policies.- Global Protocol Implementations via Attribute-Based Communication.- Symbolic Protocol Analysis with Disequality Constraints modulo Equational Theories.- Language Representability of Finite P/T Nets.- Soulmate Algorithms.- Active Knowledge, LuNA and Literacy for Oncoming Centuries.- There Are Two Sides to Every Question: Controller vs Attacker.- From Safety Critical Java Programs to Timed Process Models.- When to Move to Transfer Nets.- L: An Imperative DSL to Stochastically Simulate Biological Systems.