Programming Languages with Applications to Biology and Security: Essays Dedicated To Pierpaolo Degano On The Occasion Of His 65th Birthday by Chiara BodeiProgramming Languages with Applications to Biology and Security: Essays Dedicated To Pierpaolo Degano On The Occasion Of His 65th Birthday by Chiara Bodei

Programming Languages with Applications to Biology and Security: Essays Dedicated To Pierpaolo…

byChiara BodeiEditorGianluigi Ferrari, Corrado Priami

Paperback | November 20, 2015

Pricing and Purchase Info

$87.26 online 
$96.95 list price save 9%
Earn 436 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This Festschrift volume is published in honor of Pierpaolo Degano on the occasion of his 65th birthday and is the outcome of a colloquium held in Pisa, Italy, in June 2015. Pierpaolo Degano has worked on a large variety of topics including formal program semantics, concurrency theory, systems biology and security.

The volume contains 22 refereed papers and one extended abstract, including personal memoirs and regular research papers by close collaborators and friends and a laudatio illustrating his distinguished career and his main scientific contributions. The papers deal with the main research topics explored by Pierpaolo Degano and those still under his investigation.

Title:Programming Languages with Applications to Biology and Security: Essays Dedicated To Pierpaolo…Format:PaperbackDimensions:375 pagesPublished:November 20, 2015Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319255266

ISBN - 13:9783319255262

Look for similar items by category:

Reviews

Table of Contents

Pierpaolo Degano.- Pierpaolo, a great friend.- Distributed Authorization with Distributed Grammars.- Causal Trees, fi nally.- Limited Disclosure and Locality in Graphs.- Hoare Logic for Disjunctive Information Flow.- Alice and Bob: Reconciling Formal Models and Implementation.- Asynchronous Traces and Open Petri Nets.- Compliance in Behavioural Contracts: A Brief Survey.- Safe Adaptation Through Implicit Effect Coercion.- Validation of Decentralised Smart Contracts through Game Theory and Formal Methods.-
Static Evidences for Attack Reconstruction.- A Declarative View of Signaling Pathways.- Securing Android with Local Policies.- Global Protocol Implementations via Attribute-Based Communication.- Symbolic Protocol Analysis with Disequality Constraints modulo Equational Theories.- Language Representability of Finite P/T Nets.- Soulmate Algorithms.- Active Knowledge, LuNA and Literacy for Oncoming Centuries.- There Are Two Sides to Every Question: Controller vs Attacker.- From Safety Critical Java Programs to Timed Process Models.- When to Move to Transfer Nets.- L: An Imperative DSL to Stochastically Simulate Biological Systems.