Event structures : maps, monads and spans : invited talk
暂无分享,去创建一个
[1] Rocco De Nicola,et al. Testing Equivalence for Processes , 1983, ICALP.
[2] Chang Liu,et al. Term rewriting and all that , 2000, SOEN.
[3] Ian Mackie. Efficient λ-evaluation with interaction nets , 2004 .
[4] Ian Mackie,et al. A Calculus for Interaction Nets , 1999, PPDP.
[5] Emilio Tuosto,et al. The Klaim Project: Theory and Practice , 2003, Global Computing.
[6] R. J. vanGlabbeek. The linear time - branching time spectrum , 1990 .
[7] Martín Abadi,et al. Deciding knowledge in security protocols under (many more) equational theories , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[8] Davide Sangiorgi,et al. On asynchrony in name-passing calculi , 1998, Mathematical Structures in Computer Science.
[9] Matthew Hennessy,et al. Testing Theories for Asynchronous Languages , 1998, FSTTCS.
[10] Jorge Sousa Pinto,et al. Sequential and Concurrent Abstract Machines for Interaction Nets , 2000, FoSSaCS.
[11] Yannick Chevalier,et al. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents , 2003, FSTTCS.
[12] Ugo Montanari,et al. History-Dependent Automata , 1998 .
[13] Véronique Cortier,et al. A survey of algebraic properties used in cryptographic protocols , 2006, J. Comput. Secur..
[14] Javier Esparza,et al. Decidability and Complexity of Petri Net Problems - An Introduction , 1996, Petri Nets.
[15] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[16] Catuscia Palamidessi,et al. Comparing the expressive power of the synchronous and the asynchronous π-calculus , 1998, POPL '97.
[17] Didier Caucal,et al. On the Regular Structure of Prefix Rewriting , 1990, Theor. Comput. Sci..
[18] Rocco De Nicola,et al. Testing Equivalence for Mobile Processes , 1995, Inf. Comput..
[19] Nathalie Bertrand,et al. Model Checking Lossy Channels Systems Is Probably Decidable , 2003, FoSSaCS.
[20] Claude Kirchner,et al. A rho-Calculus of Explicit Constraint Application , 2004, WRLA.
[21] Uwe Nestmann,et al. On Bisimulations for the Spi Calculus , 2002, AMAST.
[22] Glynn Winskel,et al. Bisimulation from Open Maps , 1994, Inf. Comput..
[23] Martín Abadi,et al. A Bisimulation Method for Cryptographic Protocols , 1998, Nord. J. Comput..
[24] Parosh Aziz Abdulla,et al. Algorithmic Analysis of Programs with Well Quasi-ordered Domains , 2000, Inf. Comput..
[25] Yves Lafont,et al. Interaction nets , 1989, POPL '90.
[26] Maciej Koutny,et al. Asynchronous Box Calculus , 2002, Fundam. Informaticae.
[27] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[28] Robert de Simone,et al. The SL Synchronous Language , 1996, IEEE Trans. Software Eng..
[29] Uwe Nestmann,et al. Symbolic Bisimulation in the Spi Calculus , 2004, CONCUR.
[30] D. Walker,et al. A Calculus of Mobile Processes, Part I , 1989 .
[31] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[32] Stephen A. Cook,et al. Characterizations of Pushdown Machines in Terms of Time-Bounded Computers , 1971, J. ACM.
[33] Roberto M. Amadio,et al. Max-Plus Quasi-interpretations , 2003, TLCA.
[34] C. Bodei,et al. Some Concurrency Models in a Categorical Framework Extended Abstract , 1998 .
[35] Thomas A. Henzinger,et al. A classification of symbolic transition systems , 2000, TOCL.
[36] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[37] Pierre Wolper,et al. An efficient automata approach to some problems on context-free grammars , 2000, Inf. Process. Lett..
[38] Jorge Sousa Pinto,et al. Weak reduction and garbage collection in interaction nets , 2003, WRS.
[39] Alain Finkel,et al. Unreliable Channels are Easier to Verify Than Perfect Channels , 1996, Inf. Comput..
[40] Maria Grazia Buscemi,et al. A method for symbolic analysis of security protocols , 2005, Theor. Comput. Sci..
[41] Søren Christensen,et al. Coloured Petri Nets Extended with Place Capacities, Test Arcs and Inhibitor Arcs , 1992, Application and Theory of Petri Nets.
[42] Diletta Cacciagrano,et al. On Synchronous and Asynchronous Communication Paradigms , 2001, ICTCS.
[43] Frank S. de Boer,et al. Asynchronous communication in process algebra , 1992, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science.
[44] Berthold Hoffmann,et al. Hierarchical Graph Transformation , 2002, J. Comput. Syst. Sci..
[45] Parosh Aziz Abdulla,et al. Verifying Programs with Unreliable Channels , 1996, Inf. Comput..
[46] Hanna Klaudel,et al. M-nets: An algebra of high-level Petri nets, with an application to the semantics of concurrent programming languages , 1998, Acta Informatica.
[47] Mario Tokoro,et al. An Object Calculus for Asynchronous Communication , 1991, ECOOP.
[48] Faron Moller,et al. Verification on Infinite Structures , 2001, Handbook of Process Algebra.
[49] L. Dickson. Finiteness of the Odd Perfect and Primitive Abundant Numbers with n Distinct Prime Factors , 1913 .
[50] Claude Kirchner,et al. Pure patterns type systems , 2003, POPL '03.
[51] Silvano Dal-Zilio,et al. Resource control for synchronous cooperative threads , 2005, Theor. Comput. Sci..
[52] Simon L. Peyton Jones,et al. The Implementation of Functional Programming Languages , 1987 .
[53] Roberto M. Amadio. Synthesis of max-plus quasi-interpretations , 2005, Fundam. Informaticae.
[54] Maciej Koutny,et al. Petri Net Algebra , 2001, Monographs in Theoretical Computer Science An EATCS Series.
[55] Rocco De Nicola,et al. Proof techniques for cryptographic processes , 1999, Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158).
[56] Ian Mackie,et al. A Higher-Order Calculus for Graph Transformation , 2007, TERMGRAPH.
[57] Val Tannen,et al. A Typed Pattern Calculus , 1996, Inf. Comput..
[58] Rocco De Nicola,et al. On the expressive power of KLAIM-based calculi , 2006, Theor. Comput. Sci..
[59] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[60] Andrea Asperti,et al. The bologna optimal higher-order machine , 1995, Journal of Functional Programming.
[61] Uwe Nestmann. What is a "Good" Encoding of Guarded Choice? , 2000, Inf. Comput..
[62] Maribel Fernández,et al. Interaction Nets with McCarthy's amb: Properties and Applications , 2003, Nord. J. Comput..
[63] Claude Kirchner,et al. Rewriting Calculus with(out) Types , 2004, Workshop on Rewriting Logic and Its Applications.
[64] Robin Milner,et al. Bigraphs and mobile processes (revised) , 2004 .
[65] Mark Ryan,et al. Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks , 2005, SecCo.
[66] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[67] Jonathan K. Millen,et al. Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.
[68] Matthew Hennessy,et al. Algebraic theory of processes , 1988, MIT Press series in the foundations of computing.
[69] Martín Abadi,et al. Deciding knowledge in security protocols under equational theories , 2004, Theor. Comput. Sci..
[70] Corrado Priami,et al. Global Computing. Programming Environments, Languages, Security, and Analysis of Systems , 2003, Lecture Notes in Computer Science.
[71] Maciej Koutny,et al. A Petri Net Semantics of a Simple Process Algebra for Mobility , 2005, EXPRESS.
[72] Alain Finkel,et al. Decidability of the termination problem for completely specified protocols , 1994, Distributed Computing.
[73] Yuxi Fu. On quasi-open bisimulation , 2005, Theor. Comput. Sci..
[74] John C. Mitchell,et al. Probabilistic polynomial-time process calculus and security protocol analysis , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.
[75] Neil D. Jones,et al. The size-change principle for program termination , 2001, POPL '01.
[76] Kohei,et al. Two bisimilarities in-calculus , 2007 .
[77] Alain Finkel,et al. A Generalization of the Procedure of Karp and Miller to Well Structured Transition Systems , 1987, ICALP.
[78] Graham Higman,et al. Ordering by Divisibility in Abstract Algebras , 1952 .
[79] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[80] Ian Mackie,et al. Interaction Nets and Term-Rewriting Systems , 1998, Theor. Comput. Sci..
[81] Catuscia Palamidessi,et al. Separation of synchronous and asynchronous communication via testing , 2007, Theor. Comput. Sci..
[82] Marc Pouzet,et al. ReactiveML: a reactive extension to ML , 2005, PPDP.
[83] Martín Abadi,et al. The geometry of optimal lambda reduction , 1992, POPL '92.