Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday

Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday

ISBN-10:
3319255266
ISBN-13:
9783319255262
Pub. Date:
01/11/2017
Publisher:
Springer International Publishing
ISBN-10:
3319255266
ISBN-13:
9783319255262
Pub. Date:
01/11/2017
Publisher:
Springer International Publishing
Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday

Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days. Not Eligible for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

This Festschrift volume is published in honor of Pierpaolo Degano on the occasion of his 65th birthday and is the outcome of a colloquium held in Pisa, Italy, in June 2015. Pierpaolo Degano has worked on a large variety of topics including formal program semantics, concurrency theory, systems biology and security.

The volume contains 22 refereed papers and one extended abstract, including personal memoirs and regular research papers by close collaborators and friends and a laudatio illustrating his distinguished career and his main scientific contributions. The papers deal with the main research topics explored by Pierpaolo Degano and those still under his investigation.


Product Details

ISBN-13: 9783319255262
Publisher: Springer International Publishing
Publication date: 01/11/2017
Series: Lecture Notes in Computer Science , #9465
Edition description: 1st ed. 2015
Pages: 375
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Pierpaolo Degano.- Pierpaolo, a great friend.- Distributed Authorization with Distributed Grammars.- Causal Trees, fi nally.- Limited Disclosure and Locality in Graphs.- Hoare Logic for Disjunctive Information Flow.- Alice and Bob: Reconciling Formal Models and Implementation.- Asynchronous Traces and Open Petri Nets.- Compliance in Behavioural Contracts: A Brief Survey.- Safe Adaptation Through Implicit Effect Coercion.- Validation of Decentralised Smart Contracts through Game Theory and Formal Methods.- Static Evidences for Attack Reconstruction.- A Declarative View of Signaling Pathways.- Securing Android with Local Policies.- Global Prool Implementations via Attribute-Based Communication.- Symbolic Prool Analysis with Disequality Constraints modulo Equational Theories.- Language Representability of Finite P/T Nets.- Soulmate Algorithms.- Active Knowledge, LuNA and Literacy for Oncoming Centuries.- There Are Two Sides to Every Question: Controller vs Attacker.- From Safety Critical Java Programs to Timed Process Models.- When to Move to Transfer Nets.- L: An Imperative DSL to Shastically Simulate Biological Systems.
From the B&N Reads Blog

Customer Reviews