default search action
18th ICTAC 2021: Virtual Event / Nur-Sultan / Astana, Kazakhstan
- Antonio Cerone, Peter Csaba Ölveczky:
Theoretical Aspects of Computing - ICTAC 2021 - 18th International Colloquium, Virtual Event, Nur-Sultan, Kazakhstan, September 8-10, 2021, Proceedings. Lecture Notes in Computer Science 12819, Springer 2021, ISBN 978-3-030-85314-3
Invited Papers
- Wil M. P. van der Aalst:
Concurrency and Objects Matter! Disentangling the Fabric of Real Operational Processes to Create Digital Twins. 3-17 - Alan J. Dix:
Qualitative-Quantitative Reasoning: Thinking Informally About Formal Things. 18-35
Databases and Distributed Transactions
- Luis Henrique Bustamante, Ana Teresa C. Martins:
Some Aspects of the Database Resilience. 39-46 - Jürgen König, Heike Wehrheim:
On the Correctness Problem for Serializability. 47-64
Efficient Model Checking Methods
- Rick Erkens, Jan Friso Groote:
A Set Automaton to Locate All Pattern Matches in a Term. 67-85 - Muhammad Hannan Khan, Osman Hassan, Shahid Khan:
Accelerating SpMV Multiplication in Probabilistic Model Checkers Using GPUs. 86-104 - Yati Phyo, Canh Minh Do, Kazuhiro Ogata:
A Divide & Conquer Approach to Conditional Stable Model Checking. 105-111
Formalization and Verification in Coq and Isabelle
- Luís Cruz-Filipe, Fabrizio Montesi, Marco Peressotti:
Certifying Choreography Compilation. 115-133 - Stéphane Kastenbaum, Benoît Boyer, Jean-Pierre Talpin:
A Mechanically Verified Theory of Contracts. 134-151 - Liyi Li, Elsa L. Gunter:
A Complete Semantics of $\mathbb {K}$ and Its Translation to Isabelle. 152-171
Quantum Computing
- Alejandro Díaz-Caro, Gilles Dowek:
A New Connective in Natural Deduction, and Its Application to Quantum Computing. 175-193
Security and Privacy
- Sayan Biswas, Kangsoo Jung, Catuscia Palamidessi:
An Incentive Mechanism for Trading Personal Data in Data Markets. 197-213 - Julia Eisentraut, Stephan Holzer, Katharina Klioba, Jan Kretínský, Lukas Pin, Alexander Wagner:
Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions. 214-234 - Ross Horne, Sjouke Mauw, Semen Yurkov:
Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity. 235-255 - Yoshifumi Manabe, Hibiki Ono:
Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations. 256-274 - Sanjiva Prasad, R. Madhukar Yerraguntla:
Normalising Lustre Preserves Security. 275-292
Synthesis and Learning
- Wenjing Chu, Shuo Chen, Marcello M. Bonsangue:
Learning Probabilistic Automata Using Residuals. 295-313 - Isabela Dramnesc, Tudor Jebelean:
AlCons : Deductive Synthesis of Sorting Algorithms in Theorema. 314-333 - Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Reactive Synthesis from Visibly Register Pushdown Automata. 334-353
Systems Calculi and Analysis
- Emmanuel Hainry, Emmanuel Jeandel, Romain Péchoux, Olivier Zeyen:
ComplexityParser: An Automatic Tool for Certifying Poly-Time Complexity of Java Programs. 357-365 - Marino Miculan, Michele Pasqua:
A Calculus for Attribute-Based Memory Updates. 366-385 - Tomoki Shiraishi, Kentaro Kikuchi, Takahito Aoto:
A Proof Method for Local Sufficient Completeness of Term Rewriting Systems. 386-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.