Davide Chiarugi, M. Falaschi, C. Olarte, C. Palamidessi
{"title":"A Declarative View of Signaling Pathways","authors":"Davide Chiarugi, M. Falaschi, C. Olarte, C. Palamidessi","doi":"10.1007/978-3-319-25527-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_13","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124547267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compliance in Behavioural Contracts: A Brief Survey","authors":"Massimo Bartoletti, Tiziana Cimoli, R. Zunino","doi":"10.1007/978-3-319-25527-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_9","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131693489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Zunino, Durica Nikolic, C. Priami, Ozan Kahramanoğulları, T. Schiavinotto
{"title":"ℓ: An Imperative DSL to Stochastically Simulate Biological Systems","authors":"R. Zunino, Durica Nikolic, C. Priami, Ozan Kahramanoğulları, T. Schiavinotto","doi":"10.1007/978-3-319-25527-9_23","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_23","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pierpaolo Degano","authors":"C. Bodei, G. Ferrari, C. Priami","doi":"10.1007/978-3-319-25527-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_1","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132910179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods","authors":"G. Bigi, A. Bracciali, G. Meacci, E. Tuosto","doi":"10.1007/978-3-319-25527-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_11","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Santiago Escobar, C. Meadows, J. Meseguer, Sonia Santiago
{"title":"Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories","authors":"Santiago Escobar, C. Meadows, J. Meseguer, Sonia Santiago","doi":"10.1007/978-3-319-25527-9_16","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_16","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Android with Local Policies","authors":"Gabriele Costa","doi":"10.1007/978-3-319-25527-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_14","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130660762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alice and Bob: Reconciling Formal Models and Implementation","authors":"O. Almousa, S. Mödersheim, L. Viganò","doi":"10.1007/978-3-319-25527-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_7","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global Protocol Implementations via Attribute-Based Communication","authors":"R. Nicola, C. A. Mezzina, H. Vieira","doi":"10.1007/978-3-319-25527-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_15","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pierpaolo, a Great Friend","authors":"M. Massai","doi":"10.1007/978-3-319-25527-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_2","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}