Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/645870guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
TACS '01: Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
2001 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
October 29 - 31, 2001
ISBN:
978-3-540-42736-0
Published:
29 October 2001

Reflects downloads up to 12 Nov 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
A Spatial Logic for Concurrency
Pages 1–37

We present a logic that can express properties of freshness, secrecy, structure, and behavior of concurrent systems. In addition to standard logical and temporal operators, our logic includes spatial operations corresponding to composition, local name ...

Article
Boxed Ambients
Pages 38–63

Boxed Ambients are a variant of Mobile Ambients that result from (i) dropping the open capability and (ii) providing new primitives for ambient communication while retaining the constructs in and out for mobility. The new model of communication is ...

Article
A Typed Process Calculus for Fine-Grained Resource Access Control in Distributed Computation
Pages 64–81

We propose the D-calculus, a process calculus that can flexibly model fine-grained control of resource access in distributed computation, with a type system that statically prevents access violations. Access control of resources is important in ...

Article
Formal Eavesdropping and Its Computational Interpretation
Pages 82–94

We compare two views of symmetric cryptographic primitives in the context of the systems that use them. We express those systems in a simple programming language; each of the views yields a semantics for the language. One of the semantics treats ...

Article
Resource-Passing Concurrent Programming
Pages 95–126

The use of types to deal with access capabilities of program entities is becoming increasingly popular.In concurrent logic programming, the first attempt was made in Moded Flat GHC in 1990, which gave polarity structures (modes) to every variable ...

Article
Solo Diagrams
Pages 127–144

We address the problems of implementing the replication operator efficiently in the solos calculus - a calculus of mobile processes without prefix. This calculus is expressive enough to admit an encoding of the whole fusion calculus and thus the -...

Article
Observational Equivalence for Synchronized Graph Rewriting with Mobility
Pages 145–164

We introduce a notion of bisimulation for graph rewriting systems, allowing us to prove observational equivalence for dynamically evolving graphs and networks.We use the framework of synchronized graph rewriting with mobility which we describe in two ...

Article
Fixed-Point Logic with the Approximation Modality and Its Kripke Completeness
Pages 165–182

We present two modal typing systems with the approximation modality, which has been proposed by the author to capture selfreferences involved in computer programs and their specifications. The systems are based on the simple and the F-semantics of types,...

Article
Termination Proofs and Complexity Certification
Pages 183–200

We show that simple structural conditions on proofs of convergence of equational programs, in the intrinsic-theories verification framework of [16], correspond to resource bounds on program execution. These conditions may be construed as reflecting ...

Article
A Renee Equation for Algorithmic Complexity
Pages 201–218

We introduce a notion of complexity for the renee equation and use it to develop a method for analyzing search algorithms which enables a uniform treatment of techniques that manipulate discrete data, like linear and binary search of lists, as well as ...

Article
Nominal Logic: A First Order Theory of Names and Binding
Pages 219–242

This paper formalises within first-order logic some common practices in computer science to do with representing and reasoning about syntactical structures involving named bound variables (as opposed to nameless terms, explicit substitutions, or higher ...

Article
A Logic Programming Language Based on Binding Algebras
Pages 243–262

We give a logic programming language based on Fiore, Plotkin and Turi's binding algebras.In this language, we can use not only first-order terms but also terms involving variable binding.The aim of this language is similar to Nadathur and Miller's ...

Article
Proof-Search and Countermodel Generation in Propositional BI Logic
Pages 263–282

In this paper, we study proof-search in the propositional BI logic that can be viewed as a merging of intuitionistic logic and multiplicative intuitionistic linear logic. With its underlying sharing interpretation, BI has been recently used for logic ...

Article
Generation of a Linear Time Query Processing Algorithm Based on Well-Quasi-Orders
Pages 283–297

This paper demonstrates the generation of a linear time query processing algorithm based on the constructive proof of Higman's lemma described by Murthy-Russell (IEEE LICS 1990). A linear time evaluation of a fixed disjunctive monadic query in an ...

Article
Modelisation of Timed Automata in Coq
Pages 298–315

This paper presents the modelisation of a special class of timed automata, named p-automata in the proof assistant Coq. This work was performed in the framework of the CALIFE project1 which aims to build a general platform for specification, validation ...

Article
Model-Checking LTL with Regular Valuations for Pushdown Systems
Pages 316–339

Recent works have proposed pushdown systems as a tool for analyzing programs with (recursive) procedures. In particular, the model-checking problem for LTL has been studied. In this paper we examine an extension of this, namely model-checking with ...

Article
What Will Be Eventually True of Polynomial Hybrid Automata?
Pages 340–359

Hybrid automata have been introduced in both control engineering and computer science as a formal model for the dynamics of hybrid discrete-continuous systems. While computability issues concerning safety properties have been extensively studied, ...

Article
Non-structural Subtype Entailment in Automata Theory
Pages 360–384

Decidability of non-structural subtype entailment is a long standing open problem in programming language theory. In this paper, we apply automata theoretic methods to characterize the problem equivalently by using regular expressions and word ...

Article
Bisimulation and Other Undecidable Equivalences for Lossy Channel Systems
Pages 385–399

Lossy channel systems are systems of finite state automata that communicate via unreliable unbounded fifo channels. Today the main open question in the theory of lossy channel systems is whether bisimulation is decidable.We show that bisimulation, ...

Article
Weakest Congruence Results Concerning "Any-Lock"
Pages 400–419

In process algebras the weakest congruences that preserve interesting properties of systems are of theoretical and practical importance. A system can stop executing visible actions in two ways: by deadlocking or livelocking. The weakest deadlock-...

Article
Design and Correctness of Program Transformations Based on Control-Flow Analysis
Pages 420–447

We show how control-flow-based program transformations in functional languages can be proven correct. The method relies upon "defunctionalization," a mapping from a higher-order language to a firstorder language. We first show that defunctionalization ...

Article
Infinite Intersection and Union Types for the Lazy Lambda Calculus
Pages 448–458

A type theory with infinitary intersection and union types for the lazy -calculus is introduced. Types are viewed as upper closed subsets of a Scott domain. Intersection and union type constructors are interpreted as the set-theoretic intersection and ...

Article
Strong Normalization of Second Order Symmetric Lambda-mu Calculus
Pages 459–467

Parigot suggested symmetric structural reduction rules for application to -abstraction in [9]to ensure unique representation of data type. We prove strong normalization of second order -calculus with these rules.

Article
The Girard-Reynolds Isomorphism
Pages 468–491

The second-order polymorphic lambda calculus, F2, was independently discovered by Girard and Reynolds. Girard additionally proved a representation theorem: every function on natural numbers that can be proved total in second-order intuitionistic ...

Article
Lightweight Analysis of Object Interactions
Pages 492–513

The state of the practice in object-oriented software development has moved beyond reuse of code to reuse of conceptual structures such as design patterns. This paper draws attention to some difficulties that need to be solved if this style of ...

Article
Typing Assembly Programs with Explicit Forwarding
Pages 514–534

We consider processor architectures where communication of values is achieved through operand queues instead of registers. Explicit forwarding tags in an instruction's code denote the source of its operands and the destination of its result. We give ...

Article
The UDP Calculus: Rigorous Semantics for Real Networking
Pages 535–559

Network programming is notoriously hard to understand: one has to deal with a variety of protocols (IP, ICMP, UDP, TCP etc.), concurrency, packet loss, host failure, timeouts, the complex sockets interface to the protocols, and subtle portability ...

Article
Unison: A File Synchronizer and Its Specification
Page 560

File synchronizers are tools that reconcile disconnected modifications to replicated directory structures. Like other replication and reconciliation facilities provided by modern operating systems and middleware layers, trustworthy synchronizers are ...

Contributors
  • The University of Tokyo
  • University of Pennsylvania

Recommendations