Concurrency, Security, and Puzzles: Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday

Author:   Thomas Gibson-Robinson ,  Philippa Hopcroft ,  Ranko Lazić
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10160
ISBN:  

9783319510453


Pages:   319
Publication Date:   18 December 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Concurrency, Security, and Puzzles: Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday


Add your own review!

Overview

Full Product Details

Author:   Thomas Gibson-Robinson ,  Philippa Hopcroft ,  Ranko Lazić
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10160
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   5.153kg
ISBN:  

9783319510453


ISBN 10:   3319510452
Pages:   319
Publication Date:   18 December 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Bill Roscoe, on his 60th Birthday.- A Tribute to Bill Roscoe, on the Occasion of his 60th Birthday.- Herding Cats, Oxford Style.- Stealthy Protocols: Metrics and Open Problems.- A Specification Theory of Real-Time Processes.- Towards Verification of Cyber-Physical Systems with UTP and Isabelle/HOL.- FDR: From Theory to Industrial Application.- Information Flow, Distributed Systems, and Refinement, by Example.- Abstractions for Transition Systems with Applications to Stubborn Sets.- A Hybrid Relational Modelling Language.- What Makes Petri Nets Harder to Verify: Stack or Data.- Analysing Lock-Free Linearizable Datatypes Using CSP.- Discrete Random Variables over Domains, Revisited.- A Demonic Lattice of Information.- A Brief History of Security Protocols.- More Stubborn Set Methods for Process Algebras.- A Branching Time Model of CSP.- Virtualization Based Development. 

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List