scispace - formally typeset
Search or ask a question

Showing papers in "Electronic Notes in Theoretical Computer Science in 2000"


Journal ArticleDOI
TL;DR: This approach constitutes a bridge between modal languages for coalgebras and the modal logic for Kripke-structures, and presents a sound and complete deduction calculus in case the constants in F are finite.

120 citations


Journal ArticleDOI
TL;DR: A novel model of security for reactive systems, generalizing previous definitions relying on the simulatability paradigm is presented, and it has the first general composition theorem, and a link to requirements formulated in logics.

82 citations


Journal ArticleDOI
TL;DR: This work characterises Turi and Plotkin's model of GSOS as a distributive law of a monad over a co-pointed endofunctor, and analyses generalised coiteration and coalgebraic coinduction “up-to” in terms of a distributives law of the underlying pointed end ofunctor of amonad over an endof unctor.

74 citations


Journal ArticleDOI
TL;DR: It is proved that one can characterize any given coalgebra up to simulation (and, in certain conditions, up to bisimulation) by a single sentence, and it is shown that truth for this logic can be understood as a simulation relation itself, but with respect to a richer functor F.

64 citations


Journal ArticleDOI
TL;DR: In this article, a Markovian process algebra with probabilities, priorities, zero durations, and a master-reactive slaves synchronization mechanism is introduced and proved congruence w.r.t.

47 citations


Journal ArticleDOI
TL;DR: An abstract interpretation-based analysis for automatically proving non-trivial properties of mobile systems of processes based on properties relying on the number of occurrences of processes during computation sequences, such as mutual exclusion and non-exhaustion of resources is proposed.

44 citations


Journal ArticleDOI
TL;DR: The solution is based on CINNI, a new calculus of explicit substitutions that makes use of a term representation that contains both the standard named notation and de Bruijn's indexed notation as special subcases.

39 citations


Journal ArticleDOI
TL;DR: This paper will give an overview of quantum computation from the point of view of a complexity theorist and see that one can think of BQP as yet another complexity class and study its power without focusing on the physical aspects behind it.

37 citations


Journal ArticleDOI
TL;DR: A characterization of monos in Set F in terms of congruences and bisimulations is given, which explains, under which conditions monos must be injective maps.

35 citations


Journal ArticleDOI
TL;DR: This paper introduces (back-and-forth) transformations between coalgebras of simple polynomial functors and certain Boolean algebrAs with operators (BAOs) that take the form of an adjunction.

34 citations


Journal ArticleDOI
TL;DR: This paper proves coinduction theorems for final coalgebras of endofunctors on categories of partial orders and (generalized) metric spaces and gives a condition under which the operational notion of simulation coincides with the denotational notion of final semantics.

Journal ArticleDOI
TL;DR: A technique is introduced which can be used to model both sequential and parallel composition (in interleaving semantics) while providing the general advantages of the technique of continuations while applying the CSC technique in designing operational and denotational models for two simple nonuniform concurrent languages.

Journal ArticleDOI
TL;DR: It is shown that there is a basic finite behavioral specification for which the behavioral satisfaction problem is not recursively enumerable, which means that there are no automatic methods for proving all true statements; in particular, behavioral logics do not admit complete deduction systems.

Journal ArticleDOI
Dieter Gollmann1
TL;DR: It is argued that the problem is not a lack of good design strategies, but confusion about the meaning of ‘authentication’, which has misled attempts to formalize this concept.

Journal ArticleDOI
TL;DR: Two conditions of the E-strategy with and without on-demand flags on which an evaluated term is always in head normal form are proposed and a method of obtaining normal forms if a way to get head normal forms is given is given.

Journal ArticleDOI
Dag Normann1
TL;DR: This work investigates a hierarchy of domains with totality where some selected base domains are closed, including domains for the reals, the natural numbers and the boolean values, under cartesian products and restricted function spaces.

Journal ArticleDOI
TL;DR: This paper is a survey of the new notions and results scattered in [13,11,12], however the speculations of Section 5 and Section 6 are new.

Journal ArticleDOI
TL;DR: In this paper, the relation between formal topology and the theory of domains is discussed, and it is shown that some open problems in one of the two fields could already have a solution in the other, and that is why an intensification of contact should be rewarding.

Journal ArticleDOI
TL;DR: Two executable languages: the rewriting logic based specification language Maude and the higher-order, lazy, functional programming language Haskell are compared experimentally on a problem in modeling and reasoning about a security protocol for authentication.

Journal ArticleDOI
TL;DR: There have been several proposals for logic programming language based on linear logic: Lolli, Lygon, and Forum, however, none of them have been implemented in Java.

Journal ArticleDOI
TL;DR: This paper investigates how the coalgebraic semantics of objects accounts for subtyping, and shows that different characterisations of so-called behavioural subtyped found in the literature can conveniently be expressed in coal algebraic terms.

Journal ArticleDOI
TL;DR: This paper extends the results of [4,7] by showing that NDC can be also easily adapted to detect secrecy attacks over networks.

Journal ArticleDOI
TL;DR: Mercury as mentioned in this paper is a Prolog-based debugger with a shared infrastructure that supports three debuggers: a simple procedural debugger similar to the tracing systems of Prolog implementations, a prototype declarative debugger, and a debugger based on the idea of automatic trace analysis.

Journal ArticleDOI
TL;DR: A systematic categorical analysis of basic concepts, constructions, and results in Universal Algebra is presented and a concept of coequational specification strictly dual to the concept of equational specification in UniversalAlgebra is developed.

Journal ArticleDOI
TL;DR: A model suitable for describing a distributed real-time system and a notion of implementation for such systems on a uniprocessor system are discussed.

Journal ArticleDOI
TL;DR: It is shown that polytypic programming can be reduced to metaprogramming, and that can be developed in a reflective first-order language like Maude, without having to extend the language.

Journal ArticleDOI
TL;DR: This paper presents a method for specifying reconfigurations or transformations over the topology of the architecture style, being sure that if the transformation can be specified, then its application over the system will be consistent with respect to the expected architecture style configuration.

Journal ArticleDOI
TL;DR: This work proposes a technique based on model checking to verify that actual information flows between applets are authorized, and proposes a security policy that associates levels to applet attributes and methods and defines authorized flows between levels.

Journal ArticleDOI
TL;DR: An algorithm is proposed that progressively refines the ESRG classes until a lumped Markov chain is obtained for almost symmetrical Stochastic Well-formed Net models.

Journal ArticleDOI
TL;DR: The authors would like to thank the Maude group and especially Jose Meseguer for many fruitful discussions and Brad Smith for helping to understand the PIM-DM protocol and kindly providing his pseudo-code.