Programming Languages with Applications to Biology and Security : Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday (Theoretical Computer Science and General Issues)

個数:

Programming Languages with Applications to Biology and Security : Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday (Theoretical Computer Science and General Issues)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 375 p.
  • 商品コード 9783319255262

Full Description

This Festschrift volume is published in honor of Pierpaolo Degano on the occasion of his 65th birthday and is the outcome of a colloquium held in Pisa, Italy, in June 2015. Pierpaolo Degano has worked on a large variety of topics including formal program semantics, concurrency theory, systems biology and security.

The volume contains 22 refereed papers and one extended abstract, including personal memoirs and regular research papers by close collaborators and friends and a laudatio illustrating his distinguished career and his main scientific contributions. The papers deal with the main research topics explored by Pierpaolo Degano and those still under his investigation. 

Contents

Pierpaolo Degano.- Pierpaolo, a great friend.- Distributed Authorization with Distributed Grammars.- Causal Trees, fi nally.- Limited Disclosure and Locality in Graphs.- Hoare Logic for Disjunctive Information Flow.- Alice and Bob: Reconciling Formal Models and Implementation.- Asynchronous Traces and Open Petri Nets.- Compliance in Behavioural Contracts: A Brief Survey.- Safe Adaptation Through Implicit Effect Coercion.- Validation of Decentralised Smart Contracts through Game Theory and Formal Methods.- Static Evidences for Attack Reconstruction.- A Declarative View of Signaling Pathways.- Securing Android with Local Policies.- Global Protocol Implementations via Attribute-Based Communication.- Symbolic Protocol Analysis with Disequality Constraints modulo Equational Theories.- Language Representability of Finite P/T Nets.- Soulmate Algorithms.- Active Knowledge, LuNA and Literacy for Oncoming Centuries.- There Are Two Sides to Every Question: Controller vs Attacker.- From Safety Critical Java Programs to Timed Process Models.- When to Move to Transfer Nets.- L: An Imperative DSL to Stochastically Simulate Biological Systems.

最近チェックした商品