|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Tiziana Margaria , Bernhard SteffenPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 2025 ed. Volume: 15219 ISBN: 9783031737084ISBN 10: 3031737083 Pages: 428 Publication Date: 09 October 2024 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsIntroduction to the REoCAS Colloquium in Honor of Rocco De Nicola’s 70th Birthday.- Systems Security Modeling and Analysis at IMT Lucca.- Klaim in the making.- Formal approaches for modeling and analysis of business process collaborations.- An abstract account of up-to techniques for inductive behavioural relations.- Language equivalence from Nondeterministic to Weighted Automata --- and back.- A Process Algebraic View of In/Out Prisoners.- Towards a Formal Testing Theory for Quantum Processes.- Testing Quantum Processes.- The ProbInG Project: Advancing Automatic Analysis of Probabilistic Loops.- Towards a probabilistic programming approach to analyse collective adaptive systems.- Can AI Help with the Formalization of Railway Cybersecurity Requirements?.- White-box validation of collective adaptive systems by statistical model checking and process mining.- Analysing collective adaptive systems by proving theorems.- Engineering Ethical-aware Collective Adaptive Systems.- Emerging Synchrony in Applauding Audiences: Formal Analysis and Specification.- Flocks of Birds: A Quantitative Evaluation.- Strategies in spatio-temporal logics for multi-agent systems.- Function-as-a-Service Allocation Policies Made Formal.- Asynchronous Multiparty Sessions with Internal Delegation.- Code-centric Code Generation.- Attack Tree Generation via Process Mining.- Local Spaces in Soft Concurrent Constraint Programming Oriented to Security.- Riding the data storms: specifying and analysing IoT security requirements with SURFING.- Preventing Out-of-Gas Exceptions by Typing.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |