default search action
65. Birthday: Pierpaolo Degano 2015
- Chiara Bodei, Gian-Luigi Ferrari, Corrado Priami:
Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 9465, Springer 2015, ISBN 978-3-319-25526-2 - Chiara Bodei, Gian-Luigi Ferrari, Corrado Priami:
Pierpaolo Degano. 1-6 - Marco Maria Massai:
Pierpaolo, a Great Friend. 7-9 - Martín Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly:
Distributed Authorization with Distributed Grammars. 10-26 - Roberto Bruni, Ugo Montanari, Matteo Sammartino:
Causal Trees, Finally. 27-43 - Joshua D. Guttman:
Limited Disclosure and Locality in Graphs. 44-46 - Hanne Riis Nielson, Flemming Nielson, Ximeng Li:
Hoare Logic for Disjunctive Information Flow. 47-65 - Omar Almousa, Sebastian Mödersheim, Luca Viganò:
Alice and Bob: Reconciling Formal Models and Implementation. 66-85 - Paolo Baldan, Filippo Bonchi, Fabio Gadducci, Giacoma Valentina Monreale:
Asynchronous Traces and Open Petri Nets. 86-102 - Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino:
Compliance in Behavioural Contracts: A Brief Survey. 103-121 - Davide Basile, Letterio Galletta, Gianluca Mezzetti:
Safe Adaptation Through Implicit Effect Coercion. 122-141 - Giancarlo Bigi, Andrea Bracciali, Giovanni Meacci, Emilio Tuosto:
Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods. 142-161 - Chiara Bodei, Linda Brodo, Riccardo Focardi:
Static Evidences for Attack Reconstruction. 162-182 - Davide Chiarugi, Moreno Falaschi, Carlos Olarte, Catuscia Palamidessi:
A Declarative View of Signaling Pathways. 183-201 - Gabriele Costa:
Securing Android with Local Policies. 202-218 - Rocco De Nicola, Claudio Antares Mezzina, Hugo Torres Vieira:
Global Protocol Implementations via Attribute-Based Communication. 219-237 - Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories. 238-261 - Roberto Gorrieri:
Language Representability of Finite P/T Nets. 262-282 - Fabrizio Luccio, Linda Pagli:
Soulmate Algorithms. 283-291 - Victor Malyshkin:
Active Knowledge, LuNA and Literacy for Oncoming Centuries. 292-303 - Fabio Martinelli, Ilaria Matteucci, Francesco Santini:
There are Two Sides to Every Question - Controller Versus Attacker. 304-318 - Bent Thomsen, Kasper Søe Luckow, Lone Leth Thomsen, Thomas Bøgholm:
From Safety Critical Java Programs to Timed Process Models. 319-338 - Gianluigi Zavattaro:
When to Move to Transfer Nets - On the Limits of Petri Nets as Models for Process Calculi. 339-353 - Roberto Zunino, Durica Nikolic, Corrado Priami, Ozan Kahramanogullari, Tommaso Schiavinotto:
ℓ: An Imperative DSL to Stochastically Simulate Biological Systems. 354-374
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.