Programming Languages with Applications to Biology and Security最新文献

筛选
英文 中文
A Declarative View of Signaling Pathways 信号通路的声明性观点
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_13
Davide Chiarugi, M. Falaschi, C. Olarte, C. Palamidessi
{"title":"A Declarative View of Signaling Pathways","authors":"Davide Chiarugi, M. Falaschi, C. Olarte, C. Palamidessi","doi":"10.1007/978-3-319-25527-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_13","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124547267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Compliance in Behavioural Contracts: A Brief Survey 行为契约中的合规性:简要调查
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_9
Massimo Bartoletti, Tiziana Cimoli, R. Zunino
{"title":"Compliance in Behavioural Contracts: A Brief Survey","authors":"Massimo Bartoletti, Tiziana Cimoli, R. Zunino","doi":"10.1007/978-3-319-25527-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_9","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131693489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
ℓ: An Imperative DSL to Stochastically Simulate Biological Systems 随机模拟生物系统的命令式DSL
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_23
R. Zunino, Durica Nikolic, C. Priami, Ozan Kahramanoğulları, T. Schiavinotto
{"title":"ℓ: An Imperative DSL to Stochastically Simulate Biological Systems","authors":"R. Zunino, Durica Nikolic, C. Priami, Ozan Kahramanoğulları, T. Schiavinotto","doi":"10.1007/978-3-319-25527-9_23","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_23","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pierpaolo Degano
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_1
C. Bodei, G. Ferrari, C. Priami
{"title":"Pierpaolo Degano","authors":"C. Bodei, G. Ferrari, C. Priami","doi":"10.1007/978-3-319-25527-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_1","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132910179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods 基于博弈论和形式化方法的去中心化智能合约验证
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_11
G. Bigi, A. Bracciali, G. Meacci, E. Tuosto
{"title":"Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods","authors":"G. Bigi, A. Bracciali, G. Meacci, E. Tuosto","doi":"10.1007/978-3-319-25527-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_11","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 94
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories 具有不等式约束的模方程理论符号协议分析
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_16
Santiago Escobar, C. Meadows, J. Meseguer, Sonia Santiago
{"title":"Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories","authors":"Santiago Escobar, C. Meadows, J. Meseguer, Sonia Santiago","doi":"10.1007/978-3-319-25527-9_16","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_16","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Securing Android with Local Policies 使用本地策略保护Android
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_14
Gabriele Costa
{"title":"Securing Android with Local Policies","authors":"Gabriele Costa","doi":"10.1007/978-3-319-25527-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_14","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130660762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Alice and Bob: Reconciling Formal Models and Implementation Alice和Bob:协调正式模型和实现
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_7
O. Almousa, S. Mödersheim, L. Viganò
{"title":"Alice and Bob: Reconciling Formal Models and Implementation","authors":"O. Almousa, S. Mödersheim, L. Viganò","doi":"10.1007/978-3-319-25527-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_7","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Global Protocol Implementations via Attribute-Based Communication 基于属性通信的全局协议实现
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_15
R. Nicola, C. A. Mezzina, H. Vieira
{"title":"Global Protocol Implementations via Attribute-Based Communication","authors":"R. Nicola, C. A. Mezzina, H. Vieira","doi":"10.1007/978-3-319-25527-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_15","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pierpaolo, a Great Friend Pierpaolo,一个伟大的朋友
Programming Languages with Applications to Biology and Security Pub Date : 2015-08-01 DOI: 10.1007/978-3-319-25527-9_2
M. Massai
{"title":"Pierpaolo, a Great Friend","authors":"M. Massai","doi":"10.1007/978-3-319-25527-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-25527-9_2","url":null,"abstract":"","PeriodicalId":302770,"journal":{"name":"Programming Languages with Applications to Biology and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信