Search

Your search keyword '"Behavioural Equivalence"' showing total 73 results

Search Constraints

Start Over You searched for: Descriptor "Behavioural Equivalence" Remove constraint Descriptor: "Behavioural Equivalence"
73 results on '"Behavioural Equivalence"'

Search Results

1. Mapping Petri Nets onto a Calculus of Context-Aware Ambients

2. Mapping Petri Nets onto a Calculus of Context-Aware Ambients.

3. A MODEL OF ACTORS AND GREY FAILURES.

4. Eager functions as processes.

5. On the Executability of Interactive Computation

6. Idea: Enforcing Security Properties by Solving Behavioural Equations

7. The Proof Technique of Unique Solutions of Contractions

8. Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems

9. Trees from Functions as Processes

10. Hereditary History-Preserving Bisimilarity: Logics and Automata

11. Concurrency and Reversibility

13. On the Semantics of Markov Automata

14. A Logic for True Concurrency

15. A Categorical View of Timed Weak Bisimulation

16. Quantitative Logics for Equivalence of Effectful Programs.

17. Ready to Preorder: Get Your BCCSP Axiomatization for Free!

18. Bisimulation for Neighbourhood Structures

19. Complete Lattices and Up-To Techniques

21. Behavioural Specification for Hierarchical Object Composition

22. Modelling Dynamic Web Data

32. Eager Functions as Processes (long version)

33. Name-passing calculi: From fusions to preorders and types.

36. A Near-Linear-Time Algorithm for Weak Bisimilarity on Markov Chains

37. Logical Characterisation of Hybrid Conformance

38. On the Flora of Asynchronous Locally Non-monotonic Boolean Automata Networks.

39. A near-linear-time algorithm for weak bisimilarity on Markov chains

40. Logical Characterisation of Hybrid Conformance

41. Behavioural equivalences of a probabilistic pi-calculus.

42. AN APPROACH TO THE DESIGN OF OPEN ACCESS TO POLICY AND CHARGING CONTROL IN EPS.

43. Timed Mobility in process algebra and Petri nets

44. Compositional semantics of spiking neural P systems

45. Generalized Strong Preservation by Abstract Interpretation.

46. Classification of security properties in a Linda-like process algebra

47. On the representation of McCarthy's in the -calculus

48. A compositional approach to defining logics for coalgebras

49. Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk)

50. Essential concepts of algebraic specification and program development.

Catalog

Books, media, physical & digital resources