Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("pi calculus")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 168

  • Page / 7
Export

Selection :

  • and

Sequentiality and the π-calculusBERGER, Martin; HONDA, Kohei; YOSHIDA, Nobuko et al.Lecture notes in computer science. 2001, pp 29-45, issn 0302-9743, isbn 3-540-41960-8Conference Paper

An exercise in structural congruenceENGELFRIET, Joost; GELSEMA, Tjalling.Information processing letters. 2007, Vol 101, Num 1, pp 1-5, issn 0020-0190, 5 p.Article

A spatial logic for concurrency (Part I)CAIRES, Luis; CARDELLI, Luca.Lecture notes in computer science. 2001, pp 1-37, issn 0302-9743, isbn 3-540-42736-8Conference Paper

Linear forwardersGARDNERL, Philippa; LANEVE, Cosimo; WISCHIK, Lucian et al.Lecture notes in computer science. 2003, pp 415-430, issn 0302-9743, isbn 3-540-40753-7, 16 p.Conference Paper

On barbed equivalences in π-calculusSANGIORGI, Davide; WALKER, David.Lecture notes in computer science. 2001, pp 292-304, issn 0302-9743, isbn 3-540-42497-0Conference Paper

On synchronous and asynchronous communication paradigmsCACCIAGRANO, Diletta; CORRADINI, Flavio.Lecture notes in computer science. 2001, pp 256-268, issn 0302-9743, isbn 3-540-42672-8Conference Paper

Nepi2 : A two-level calculus for network programming based on the π-calculusHORITA, E; MANO, K.Lecture notes in computer science. 1997, pp 377-378, issn 0302-9743, isbn 3-540-63875-XConference Paper

Logical properties of name restrictionCARDELLI, Luca; GORDON, Andrew D.Lecture notes in computer science. 2001, pp 46-60, issn 0302-9743, isbn 3-540-41960-8Conference Paper

Primitives for authentication in process algebrasBODEI, Chiara; DEGANO, Pierpaolo; FOCARDI, Riccardo et al.Theoretical computer science. 2002, Vol 283, Num 2, pp 271-304, issn 0304-3975Article

Bigraphs as a model for mobile interactionMILNER, Robin.Lecture notes in computer science. 2002, pp 8-13, issn 0302-9743, isbn 3-540-44310-X, 6 p.Conference Paper

Semantic subtyping : Challenges, perspectives, and open problemsCASTAGNA, Giuseppe.Lecture notes in computer science. 2005, pp 1-20, issn 0302-9743, isbn 3-540-29106-7, 1Vol, 20 p.Conference Paper

Typing aberrance in signal transductionZHANG, M; LI, G. Q; FU, Y. X et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28323-4, 3Vol, Part 3, 668-677Conference Paper

A uniform reduction equivalence for process calculiZINING CAO.Lecture notes in computer science. 2004, pp 179-195, issn 0302-9743, isbn 3-540-23724-0, 17 p.Conference Paper

Representation of the signal transduction with aberrance using Ipi calculusMIN ZHANG; GUOQIANG LI; YUXI FU et al.Lecture notes in computer science. 2004, pp 477-485, issn 0302-9743, isbn 3-540-24127-2, 9 p.Conference Paper

Useless-code elimination and program slicing for the Pi-calculusKOBAYASHI, Naoki.Lecture notes in computer science. 2003, pp 55-72, issn 0302-9743, isbn 3-540-20536-5, 18 p.Conference Paper

Constraints on hypercomputationMICHAELSOR, Greg; COCKSHOTT, Paul.Lecture notes in computer science. 2006, pp 378-387, issn 0302-9743, isbn 3-540-35466-2, 1Vol, 10 p.Conference Paper

Study on equipment interoperation chain model in grid environmentYUEXUAN WANG; CHENG WU.Lecture notes in computer science. 2005, pp 588-595, issn 0302-9743, isbn 3-540-29769-3, 1Vol, 8 p.Conference Paper

Hiding names: Private authentication in the applied pi calculusFOURNET, Cédric; ABADI, Martin.Lecture notes in computer science. 2003, pp 317-338, issn 0302-9743, isbn 3-540-00708-3, 22 p.Conference Paper

On bisimulations for the spi calculusBORGSTRÖM, Johannes; NESTMANN, Uwe.Lecture notes in computer science. 2002, pp 287-303, issn 0302-9743, isbn 3-540-44144-1, 17 p.Conference Paper

From secrecy to authenticity in security protocolsBLANCHET, Bruno.Lecture notes in computer science. 2002, pp 342-359, issn 0302-9743, isbn 3-540-44235-9, 18 p.Conference Paper

The Seal calculus revisited: Contextual equivalence and bisimilarityCASTAGNA, Giuseppe; ZAPPA NARDELLI, Francesco.Lecture notes in computer science. 2002, pp 85-96, issn 0302-9743, isbn 3-540-00225-1, 12 p.Conference Paper

T-compound interaction and overhearing agentsPLATON, Eric; SABOURET, Nicolas; HONIDEN, Shinichi et al.Lecture notes in computer science. 2005, pp 90-105, issn 0302-9743, isbn 3-540-27330-1, 16 p.Conference Paper

A theory of bisimulation for a fragment of concurrent ML with local namesJEFFREY, Alan; RATHKE, Julian.Theoretical computer science. 2004, Vol 323, Num 1-3, pp 1-48, issn 0304-3975, 48 p.Article

On compositional reasoning in the Spi-calculusBOREALE, Michele; GORLA, Daniele.Lecture notes in computer science. 2002, pp 67-81, issn 0302-9743, isbn 3-540-43366-XConference Paper

The fusion machine (Extended abstract)GARDNER, Philippa; LANEVE, Cosimo; WISCHIK, Lucian et al.Lecture notes in computer science. 2002, pp 418-433, issn 0302-9743, isbn 3-540-44043-7, 16 p.Conference Paper

  • Page / 7