{"title":"Towards Verification of Cyber-Physical Systems with UTP and Isabelle/HOL","authors":"S. Foster, J. Woodcock","doi":"10.1007/978-3-319-51046-0_3","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_3","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Random Variables Over Domains, Revisited","authors":"M. Mislove","doi":"10.1007/978-3-319-51046-0_10","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_10","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Gibson-Robinson, G. Broadfoot, Gustavo Carvalho, Philippa J. Hopcroft, G. Lowe, Sidney C. Nogueira, C. O'Halloran, A. Sampaio
{"title":"FDR: From Theory to Industrial Application","authors":"Thomas Gibson-Robinson, G. Broadfoot, Gustavo Carvalho, Philippa J. Hopcroft, G. Lowe, Sidney C. Nogueira, C. O'Halloran, A. Sampaio","doi":"10.1007/978-3-319-51046-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_4","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124543081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Flow, Distributed Systems, and Refinement, by Example","authors":"J. Guttman","doi":"10.1007/978-3-319-51046-0_5","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_5","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133606134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualization Based Development","authors":"J. Yantchev, A. Parashkevov","doi":"10.1007/978-3-319-51046-0_15","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_15","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stealthy Protocols: Metrics and Open Problems","authors":"Olga Chen, C. Meadows, G. Trivedi","doi":"10.1007/978-3-319-51046-0_1","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_1","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128795174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What Makes Petri Nets Harder to Verify: Stack or Data?","authors":"R. Lazic, Patrick Totzke","doi":"10.1007/978-3-319-51046-0_8","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_8","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Specification Theory of Real-Time Processes","authors":"Chris Chilton, M. Kwiatkowska, F. Moller, Xu Wang","doi":"10.1007/978-3-319-51046-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-51046-0_2","url":null,"abstract":"","PeriodicalId":110616,"journal":{"name":"Concurrency, Security, and Puzzles","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132312281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}