|
|
|
|
LEADER |
05713nam a22005895i 4500 |
001 |
978-3-540-31934-4 |
003 |
DE-He213 |
005 |
20151204172402.0 |
007 |
cr nn 008mamaa |
008 |
100725s2005 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540319344
|9 978-3-540-31934-4
|
024 |
7 |
|
|a 10.1007/11539452
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A73
|
050 |
|
4 |
|a QA76.9.S88
|
072 |
|
7 |
|a UYD
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a COM067000
|2 bisacsh
|
082 |
0 |
4 |
|a 003.3
|2 23
|
245 |
1 |
0 |
|a CONCUR 2005 – Concurrency Theory
|h [electronic resource] :
|b 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005. Proceedings /
|c edited by Martín Abadi, Luca de Alfaro.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2005.
|
300 |
|
|
|a XXIV, 1280 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3653
|
505 |
0 |
|
|a Invited Lectures -- Static Analysis Versus Model Checking for Bug Finding -- The Benefits of Exposing Calls and Returns -- A Compositional Approach to the Stochastic Dynamics of Gene Networks -- Contributed Papers -- Games Other People Play -- Type-Directed Concurrency -- Multiport Interaction Nets and Concurrency -- Model Checking for ?-Calculus Using Proof Search -- A Game Semantics of the Asynchronous ?-Calculus -- Efficient On-the-Fly Algorithms for the Analysis of Timed Games -- Modal Logics for Timed Control -- Timed Shuffle Expressions -- A New Modality for Almost Everywhere Properties in Timed Automata -- The Coarsest Congruence for Timed Automata with Deadlines Contained in Bisimulation -- A Behavioural Pseudometric for Metric Labelled Transition Systems -- On Probabilistic Program Equivalence and Refinement -- Probabilistic Anonymity -- Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus -- Timed Spi-Calculus with Types for Secrecy and Authenticity -- Selecting Theories and Recursive Protocols -- Constraint Solving for Contract-Signing Protocols -- A Ground-Complete Axiomatization of Finite State Processes in Process Algebra -- Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP -- Bisimulations Up-to for the Linear Time Branching Time Spectrum -- Deriving Weak Bisimulation Congruences from Reduction Systems -- SOS for Higher Order Processes -- The Individual and Collective Token Interpretations of Petri Nets -- Merged Processes — A New Condensed Representation of Petri Net Behaviour -- Concurrent Clustered Programming -- A Theory of System Behaviour in the Presence of Node and Link Failures -- Comparing Two Approaches to Compensable Flow Composition -- Transactions in RCCS -- Two-Player Nonzero-Sum ?-Regular Games -- Games Where You Can Play Optimally Without Any Memory -- On Implementation of Global Concurrent Systems with Local Asynchronous Controllers -- Defining Fairness -- Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems -- Termination Analysis of Integer Linear Loops -- A Practical Application of Geometric Semantics to Static Analysis of Concurrent Programs -- Verification of Qualitative ? Constraints -- Uniform Satisfiability Problem for Local Temporal Logics over Mazurkiewicz Traces -- Taming Interface Specifications -- Synthesis of Distributed Systems from Knowledge-Based Specifications.
|
520 |
|
|
|a This volume contains the papers presented at CONCUR 2005, the 16th - ternational Conference on Concurrency Theory. The purpose of the CONCUR series of conferences is to bring together researchers,developers, and students in order to advance the theory of concurrency and to promote its applications. This year’s conference was in San Francisco, California, from August 23 to August 26. We received 100 submissions in response to a call for papers. Each subm- sionwasassignedto at leastthreemembers ofthe ProgramCommittee; in many cases, reviews were solicited from outside experts. The ProgramCommittee d- cussed the submissions electronically, judging them on their perceived imp- tance, originality, clarity, and appropriateness to the expected audience. The Program Committee selected 38 papers for presentation. Because of the format of the conference and the high number of submissions, many good papers could not be included. Although submissions werereadand evaluated, the papers that appear in this volume may di?er in form and contents from the corresponding submissions. It is expected that many of the papers will be further revised and submitted to refereed archival journals for publication.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Architecture, Computer.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Programming languages (Electronic computers).
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer logic.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer System Implementation.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|
650 |
2 |
4 |
|a Computation by Abstract Devices.
|
650 |
2 |
4 |
|a Programming Languages, Compilers, Interpreters.
|
650 |
2 |
4 |
|a Programming Techniques.
|
700 |
1 |
|
|a Abadi, Martín.
|e editor.
|
700 |
1 |
|
|a Alfaro, Luca de.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540283096
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 3653
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/11539452
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|