skip to main content
Skip header Section
Communicating and mobile systems: the π-calculusNovember 1999
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-65869-0
Published:09 November 1999
Pages:
161
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Karsten N and Nestmann U Store Locally, Prove Globally Theoretical Aspects of Computing – ICTAC 2023, (351-369)
  2. Buldas A, Draheim D and Saarepera M (2023). A Theory of Secure and Efficient Implementation of Electronic Money, SN Computer Science, 4:6, Online publication date: 8-Nov-2023.
  3. Demangeon R, Dima C and Varacca D Observational Preorders for Alternating Transition Systems Multi-Agent Systems, (312-327)
  4. Pears J, Bocchi L and King A Safe Asynchronous Mixed-Choice for Timed Interactions Coordination Models and Languages, (214-231)
  5. ACM
    Xie W, Zhu H and Wu X A Timed Calculus with Mobility for Wireless Networks Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things, (653-657)
  6. Martin A, Magnaudet M and Conversy S (2023). Computers as Interactive Machines: Can We Build an Explanatory Abstraction?, Minds and Machines, 33:1, (83-112), Online publication date: 1-Mar-2023.
  7. ACM
    Sammler M, Spies S, Song Y, D'Osualdo E, Krebbers R, Garg D and Dreyer D (2023). DimSum: A Decentralized Approach to Multi-language Semantics and Verification, Proceedings of the ACM on Programming Languages, 7:POPL, (775-805), Online publication date: 9-Jan-2023.
  8. ACM
    Xu D, Li Y, Wu C and Niu Z A Binding Bigraphical Model of Context-Aware Adaptive Systems 2022 3rd Asia Service Sciences and Software Engineering Conference, (102-107)
  9. Ngondi G, Koutavas V and Butterfield A Translation of CCS into CSP, Correct up to Strong Bisimulation Software Engineering and Formal Methods, (243-261)
  10. ACM
    Chlipala A (2021). Skipping the binder bureaucracy with mixed embeddings in a semantics course (functional pearl), Proceedings of the ACM on Programming Languages, 5:ICFP, (1-28), Online publication date: 22-Aug-2021.
  11. ACM
    Qian Z, Kavvos G and Birkedal L (2021). Client-server sessions in linear logic, Proceedings of the ACM on Programming Languages, 5:ICFP, (1-31), Online publication date: 22-Aug-2021.
  12. Ekembe Ngondi G (2021). Denotational semantics of channel mobility in UTP-CSP, Formal Aspects of Computing, 33:4-5, (803-826), Online publication date: 1-Aug-2021.
  13. Saffrich H and Thiemann P Relating Functional and Imperative Session Types Coordination Models and Languages, (61-79)
  14. Nester C The Structure of Concurrent Process Histories Coordination Models and Languages, (209-224)
  15. Zalakain U and Dardha O with Leftovers: A Mechanisation in Agda Formal Techniques for Distributed Objects, Components, and Systems, (157-174)
  16. Braghin C, Lilli M and Riccobene E Towards ASM-Based Automated Formal Verification of Security Protocols Rigorous State-Based Methods, (17-33)
  17. ACM
    Gleirscher M, Foster S and Woodcock J (2019). New Opportunities for Integrated Formal Methods, ACM Computing Surveys, 52:6, (1-36), Online publication date: 30-Nov-2020.
  18. ACM
    Canetti R (2020). Universally Composable Security, Journal of the ACM, 67:5, (1-94), Online publication date: 31-Oct-2020.
  19. Chakravarty M, Chapman J, MacKenzie K, Melkonian O, Müller J, Peyton Jones M, Vinogradova P and Wadler P Native Custom Tokens in the Extended UTXO Model Leveraging Applications of Formal Methods, Verification and Validation: Applications, (89-111)
  20. Schmidt-Schauß M and Kutz Y Nominal Unification with Letrec and Environment-Variables Logic-Based Program Synthesis and Transformation, (95-112)
  21. Frittelli L, Maldonado F, Melgratti H and Tuosto E A Choreography-Driven Approach to APIs: The OpenDXL Case Study Coordination Models and Languages, (107-124)
  22. Basile D, ter Beek M and Legay A (2019). Timed service contract automata, Innovations in Systems and Software Engineering, 16:2, (199-214), Online publication date: 1-Jun-2020.
  23. Kautz O, Rumpe B and Wortmann A (2020). Automated semantics-preserving parallel decomposition of finite component and connector architectures, Automated Software Engineering, 27:1-2, (119-151), Online publication date: 1-Jun-2020.
  24. Aman B and Ciobanu G Employing Costs in Multiagent Systems with Timed Migration and Timed Communication SOFSEM 2020: Theory and Practice of Computer Science, (441-453)
  25. ACM
    Patrignani M, Ahmed A and Clarke D (2019). Formal Approaches to Secure Compilation, ACM Computing Surveys, 51:6, (1-36), Online publication date: 30-Nov-2019.
  26. Marmsoler D and Gidey H (2019). Interactive verification of architectural design patterns in FACTum, Formal Aspects of Computing, 31:5, (541-610), Online publication date: 1-Nov-2019.
  27. ACM
    Fernando V, Joshi K and Misailovic S (2019). Verifying safety and accuracy of approximate parallel programs via canonical sequentialization, Proceedings of the ACM on Programming Languages, 3:OOPSLA, (1-29), Online publication date: 10-Oct-2019.
  28. Miyazawa A, Ribeiro P, Li W, Cavalcanti A, Timmis J and Woodcock J (2019). RoboChart, Software and Systems Modeling (SoSyM), 18:5, (3097-3149), Online publication date: 1-Oct-2019.
  29. Jeltsch W A Process Calculus for Formally Verifying Blockchain Consensus Protocols Declarative Programming and Knowledge Management, (24-39)
  30. Freiberger F and Hermanns H Concurrent Programming from pseuCo to Petri Application and Theory of Petri Nets and Concurrency, (279-297)
  31. ACM
    Scalas A, Yoshida N and Benussi E Verifying message-passing programs with dependent behavioural types Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, (502-516)
  32. ACM
    Liao K, Hammer M and Miller A ILC: a calculus for composable, computational cryptography Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, (640-654)
  33. Oquendo F Coping with Uncertainty in Systems-of-Systems Architecture Modeling on the IoT with SosADL 2019 14th Annual Conference System of Systems Engineering (SoSE), (131-136)
  34. Bodei C, Brodo L and Bruni R (2019). A formal approach to open multiparty interactions, Theoretical Computer Science, 763:C, (38-65), Online publication date: 4-Apr-2019.
  35. ACM
    Fowler S, Lindley S, Morris J and Decova S (2019). Exceptional asynchronous session types: session types without tiers, Proceedings of the ACM on Programming Languages, 3:POPL, (1-29), Online publication date: 2-Jan-2019.
  36. ACM
    Blanchette J, Gheri L, Popescu A and Traytel D (2019). Bindings as bounded natural functors, Proceedings of the ACM on Programming Languages, 3:POPL, (1-34), Online publication date: 2-Jan-2019.
  37. ACM
    Møgelberg R and Veltri N (2019). Bisimulation as path type for guarded recursive types, Proceedings of the ACM on Programming Languages, 3:POPL, (1-29), Online publication date: 2-Jan-2019.
  38. Nilsson P and Ames A Barrier Functions: Bridging the Gap between Planning from Specifications and Safety-Critical Control 2018 IEEE Conference on Decision and Control (CDC), (765-772)
  39. Matorin S, Zhikharev A and Zimovets O (2018). Object Calculus in the System---Object Method of Knowledge Representation, Scientific and Technical Information Processing, 45:5, (307-316), Online publication date: 1-Dec-2018.
  40. ACM
    Salem P The case for experiment-oriented computing Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (719-723)
  41. Danilov K, Rezin R, Afanasyev I and Kolotov A Towards Blockchain-Based Robonomics: Autonomous Agents Behavior Validation 2018 International Conference on Intelligent Systems (IS), (222-227)
  42. ACM
    Nishida Y and Igarashi A Nondeterministic Manifest Contracts Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming, (1-13)
  43. Oquendo F, Buisson J, Leroux E and Moguérou G A Formal Approach for Architecting Software-intensive Systems-of-Systems with Guarantees 2018 13th Annual Conference on System of Systems Engineering (SoSE), (14-21)
  44. ACM
    Mislove M (2018). Semantics column, ACM SIGLOG News, 5:2, (17-19), Online publication date: 30-Apr-2018.
  45. ACM
    Liu G, Jiang C and Zhou M (2018). Time-Soundness of Time Petri Nets Modelling Time-Critical Systems, ACM Transactions on Cyber-Physical Systems, 2:2, (1-27), Online publication date: 30-Apr-2018.
  46. ACM
    Giannini P, Servetto M and Zucca E A type and effect system for uniqueness and immutability Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (1038-1045)
  47. (2018). Local reversibility in a Calculus of Covalent Bonding, Science of Computer Programming, 151:C, (18-47), Online publication date: 1-Jan-2018.
  48. ACM
    Alappatt A (2017). Network applications are interactive, Communications of the ACM, 61:1, (46-53), Online publication date: 27-Dec-2017.
  49. Banks C, Elver M, Hoffmann R, Sarkar S, Jackson P and Nagarajan V Verification of a lazy cache coherence protocol against a weak memory model Proceedings of the 17th Conference on Formal Methods in Computer-Aided Design, (60-67)
  50. ACM
    Alappatt A (2017). Network Applications Are Interactive, Queue, 15:4, (89-113), Online publication date: 1-Aug-2017.
  51. Xiao Z, Xiao Y and Wu J (2017). P-Accountability, Wireless Personal Communications: An International Journal, 95:4, (3785-3812), Online publication date: 1-Aug-2017.
  52. Aman B and Ciobanu G (2017). Verification of critical systems described in real-time TiMo, International Journal on Software Tools for Technology Transfer (STTT), 19:4, (395-408), Online publication date: 1-Aug-2017.
  53. ACM
    Panangaden P (2017). The 2017 Alonzo Church award, ACM SIGLOG News, 4:3, (3-9), Online publication date: 28-Jul-2017.
  54. ACM
    Giannini P, Servetto M and Zucca E Tracing sharing in an imperative pure calculus Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs, (1-6)
  55. Oquendo F Software architecture of self-organizing systems-of-systems for the Internet-of-Things with SosADL 2017 12th System of Systems Engineering Conference (SoSE), (1-6)
  56. Oquendo F Architecturally describing the emergent behavior of software-intensive system-of-systems with SosADL 2017 12th System of Systems Engineering Conference (SoSE), (1-6)
  57. Geng H and Jamali N interActors Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (1550-1552)
  58. ACM
    Giannini P, Servetto M and Zucca E A type and effect system for sharing Proceedings of the Symposium on Applied Computing, (1513-1515)
  59. Bhattacharyya A, Mokhov A and Pierce K (2017). An empirical comparison of formalisms for modelling and analysis of dynamic reconfiguration of dependable systems, Formal Aspects of Computing, 29:2, (251-307), Online publication date: 1-Mar-2017.
  60. ACM
    Schewe K, Ferrarotti F, Tec L, Wang Q and An W Evolving concurrent systems Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  61. ACM
    Matsuda K and Asada K A functional reformulation of UnCAL graph-transformations: or, graph transformation as graph reduction Proceedings of the 2017 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, (71-82)
  62. ACM
    Oquendo F, Buisson J, Leroux E, Moguérou G and Quilbeuf J The sosADL studio Proceedings of the International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture, (1-8)
  63. Amighi A, Gomes P, Gurov D and Huisman M (2016). Provably correct control flow graphs from Java bytecode programs with exceptions, International Journal on Software Tools for Technology Transfer (STTT), 18:6, (653-684), Online publication date: 1-Nov-2016.
  64. Chaoui A and Belghiat A (2016). Mapping Mobile Statechart Diagrams to the π-Calculus using Graph Transformation, International Journal of Intelligent Information Technologies, 12:4, (1-20), Online publication date: 1-Oct-2016.
  65. Siewe F and Yang H (2016). Privacy protection by typing in ubiquitous computing systems, Journal of Systems and Software, 120:C, (133-153), Online publication date: 1-Oct-2016.
  66. ACM
    Yang F, Escobar S, Meadows C, Meseguer J and Santiago S Strand spaces with choice via a process algebra semantics Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, (76-89)
  67. Chevrou F, Hurault A and Quéinnec P (2016). On the diversity of asynchronous communication, Formal Aspects of Computing, 28:5, (847-879), Online publication date: 1-Sep-2016.
  68. Ciobanu G and Todoran E (2016). Correct metric semantics for a language inspired by DNA computing, Concurrency and Computation: Practice & Experience, 28:11, (3042-3060), Online publication date: 10-Aug-2016.
  69. Attie P and Lynch N (2016). Dynamic input/output automata, Information and Computation, 249:C, (28-75), Online publication date: 1-Aug-2016.
  70. Petersen R, Lakin M and Phillips A (2016). A strand graph semantics for DNA-based computation, Theoretical Computer Science, 632:C, (43-73), Online publication date: 13-Jun-2016.
  71. Kondratyev A and Tishchenko I Concept of distributed processing system of images flow in terms of π-calculus Proceedings of the 18th Conference of Open Innovations Association FRUCT, (131-137)
  72. Capriccioli A, Servetto M and Zucca E (2016). An Imperative Pure Calculus, Electronic Notes in Theoretical Computer Science (ENTCS), 322:C, (87-102), Online publication date: 18-Apr-2016.
  73. Aman B and Ciobanu G (2016). Modelling and verification of weighted spiking neural systems, Theoretical Computer Science, 623:C, (92-102), Online publication date: 11-Apr-2016.
  74. Colvin R (2016). Modelling and analysing neural networks using a hybrid process algebra, Theoretical Computer Science, 623:C, (15-64), Online publication date: 11-Apr-2016.
  75. D'Osualdo E and Luke Ong C On Hierarchical Communication Topologies in the $$\pi $$-calculus Proceedings of the 25th European Symposium on Programming Languages and Systems - Volume 9632, (149-175)
  76. ACM
    Åman Pohjola J and Parrow J Bisimulation up-to techniques for psi-calculi Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, (142-153)
  77. Zhang N, Duan Z and Tian C (2016). A complete axiom system for propositional projection temporal logic with cylinder computation model, Theoretical Computer Science, 609:P3, (639-657), Online publication date: 4-Jan-2016.
  78. ACM
    Belghiat A and Chaoui A A TGG Approach for Bidirectional Automatic Mapping between UML and pi-calculus Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication, (1-3)
  79. Pino L, Bonchi F and Valencia F (2015). Efficient algorithms for program equivalence for confluent concurrent constraint programming, Science of Computer Programming, 111:P1, (135-155), Online publication date: 1-Nov-2015.
  80. Pasqualin D, Vizzotto J and Piveta E (2015). Typed context awareness Ambient Calculus for pervasive applications, Formal Aspects of Computing, 27:5-6, (885-916), Online publication date: 1-Nov-2015.
  81. Cristescu I, Krivine J and Varacca D Rigid Families for CCS and the $$\pi $$-calculus Proceedings of the 12th International Colloquium on Theoretical Aspects of Computing - ICTAC 2015 - Volume 9399, (223-240)
  82. ACM
    Balzer S and Pfenning F Objects as session-typed processes Proceedings of the 5th International Workshop on Programming Based on Actors, Agents, and Decentralized Control, (13-24)
  83. ACM
    Latombe F, Crégut X, Combemale B, Deantoni J and Pantel M Weaving concurrency in executable domain-specific modeling languages Proceedings of the 2015 ACM SIGPLAN International Conference on Software Language Engineering, (125-136)
  84. Wang H, Gibbins N, Payne T, Patelli A and Wang Y (2015). A survey of Semantic Web Services formalisms, Concurrency and Computation: Practice & Experience, 27:15, (4053-4072), Online publication date: 1-Oct-2015.
  85. Zieliński B, Sobieski Ś, Kruszyński P, Sysak M and Maślanka P Object $$\pi $$-Calculus and Document Workflows Proceedings of the 5th International Conference on Model and Data Engineering - Volume 9344, (227-238)
  86. ACM
    Beal J and Viroli M (2015). Formal foundations of sensor network applications, SIGSPATIAL Special, 7:2, (36-42), Online publication date: 17-Sep-2015.
  87. Chiarugi D, Falaschi M, Olarte C and Palamidessi C A Declarative View of Signaling Pathways Essays Dedicated to Pierpaolo Degano on Programming Languages with Applications to Biology and Security - Volume 9465, (183-201)
  88. Bodei C, Brodo L, Gori R, Hermith D and Levi F A Global Occurrence Counting Analysis for Brane Calculi Revised Selected Papers of the 25th International Symposium on Logic-Based Program Synthesis and Transformation - Volume 9527, (179-200)
  89. Disney T and Flanagan C Game Semantics for Type Soundness Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (104-114)
  90. Khomenko V and Germanos V Modelling and Analysis Mobile Systems Using $$\pi $$-calculus EFCP Transactions on Petri Nets and Other Models of Concurrency X - Volume 9410, (153-175)
  91. Cavalcante E On the architecture-driven development of software-intensive systems-of-systems Proceedings of the 37th International Conference on Software Engineering - Volume 2, (899-902)
  92. ACM
    Jung R, Swasey D, Sieczkowski F, Svendsen K, Turon A, Birkedal L and Dreyer D (2015). Iris, ACM SIGPLAN Notices, 50:1, (637-650), Online publication date: 11-May-2015.
  93. Ciobanu G, Koutny M and Steggles J (2015). Strategy based semantics for mobility with time and access permissions, Formal Aspects of Computing, 27:3, (525-549), Online publication date: 1-May-2015.
  94. ACM
    Pianini D, Viroli M and Beal J Protelis Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1846-1853)
  95. Homan C and Kosub S (2015). Dichotomy results for fixed point counting in boolean dynamical systems, Theoretical Computer Science, 573:C, (16-25), Online publication date: 30-Mar-2015.
  96. Deantoni J, Diallo I, Teodorov C, Champeau J and Combemale B Towards a meta-language for the concurrency concern in DSLs Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, (313-316)
  97. Eckhardt J, Mühlbauer T, Meseguer J and Wirsing M (2015). Semantics, distributed implementation, and formal analysis of KLAIM models in Maude, Science of Computer Programming, 99:C, (24-74), Online publication date: 1-Mar-2015.
  98. Gaur M, Gay S and Mackie I A Routing Calculus with Flooding Updates Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (181-186)
  99. Chen Y, Chen Y and Madelaine E (2015). Timed-pNets, Frontiers of Computer Science: Selected Publications from Chinese Universities, 9:1, (87-110), Online publication date: 1-Feb-2015.
  100. ACM
    Jung R, Swasey D, Sieczkowski F, Svendsen K, Turon A, Birkedal L and Dreyer D Iris Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (637-650)
  101. Rai G, Gangadharan G and Padmanabhan V (2015). Algebraic Modeling and Verification of Web Service Composition, Procedia Computer Science, 52:C, (675-679), Online publication date: 1-Jan-2015.
  102. Pan H, Li Y and Cao Y (2015). Lattice-valued simulations for quantitative transition systems, International Journal of Approximate Reasoning, 56:PA, (28-42), Online publication date: 1-Jan-2015.
  103. Steiniger A, Uhrmacher A, Zinn S, Gampe J and Willekens F The role of languages for modeling and simulating continuous-time multi-level models in demography Proceedings of the 2014 Winter Simulation Conference, (2978-2989)
  104. ACM
    Grabmayer C and Rochel J (2014). Maximal sharing in the Lambda calculus with letrec, ACM SIGPLAN Notices, 49:9, (67-80), Online publication date: 26-Nov-2014.
  105. Longfield S and Manohar R Removing concurrency for rapid functional verification Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, (332-339)
  106. Kanovich M, Ban Kirigin T, Nigam V and Scedrov A (2014). Bounded memory Dolev-Yao adversaries in collaborative systems, Information and Computation, 238:C, (233-261), Online publication date: 1-Nov-2014.
  107. ACM
    Preden J Generating situation awareness in cyber-physical systems Proceedings of the 2014 International Conference on Hardware/Software Codesign and System Synthesis, (1-3)
  108. ACM
    Grabmayer C and Rochel J Maximal sharing in the Lambda calculus with letrec Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, (67-80)
  109. ACM
    Bonchi F, Gadducci F and Monreale G (2014). A General Theory of Barbs, Contexts, and Labels, ACM Transactions on Computational Logic, 15:4, (1-27), Online publication date: 1-Aug-2014.
  110. Banks C and Stark I (2014). A logic of behaviour in context, Information and Computation, 236:C, (3-18), Online publication date: 1-Aug-2014.
  111. Boer F and Gouw S Combining Monitoring with Run-Time Assertion Checking Advanced Lectures of the 14th International School on Formal Methods for Executable Software Models - Volume 8483, (217-262)
  112. Zeng K, Nielson F and Nielson H The Stochastic Quality Calculus Proceedings of the 16th IFIP WG 6.1 International Conference on Coordination Models and Languages - Volume 8459, (179-193)
  113. ACM
    Muscar A Programming Safe Agents in Blueprint Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14), (1-10)
  114. Bathelt-Tok F, Glesner S and Blankenstein O Data-dependent controller synthesis to enable reliable and safe interoperability of medical devices Proceedings of the 8th International Conference on Pervasive Computing Technologies for Healthcare, (162-165)
  115. ACM
    Laurent Y, Bendraou R, Baarir S and Gervais M Planning for declarative processes Proceedings of the 29th Annual ACM Symposium on Applied Computing, (1126-1133)
  116. ACM
    Tragatschnig S, Tran H and Zdun U Impact analysis for event-based systems using change patterns Proceedings of the 29th Annual ACM Symposium on Applied Computing, (763-768)
  117. Bresciani R and Butterfield A (2014). A UTP approach towards probabilistic protocol verification, Security and Communication Networks, 7:1, (99-107), Online publication date: 1-Jan-2014.
  118. Silva P and Melo A An Approach for the Verification of Multi-agent Systems by Formally Guided Simulations Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 02, (266-273)
  119. Fleischmann A, Kannengiesser U, Schmidt W and Stary C Subject-Oriented Modeling and Execution of Multi-agent Business Processes Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 02, (138-145)
  120. ACM
    Goel A and Choppella V State based access control for open e-governance Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance, (19-27)
  121. Aman B and Ciobanu G Real-Time Migration Properties of rTiMo Verified in Uppaal Proceedings of the 11th International Conference on Software Engineering and Formal Methods - Volume 8137, (31-45)
  122. ACM
    Asada K, Hidaka S, Kato H, Hu Z and Nakano K A parameterized graph transformation calculus for finite graphs with monadic branches Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, (73-84)
  123. Giunti M and Ravara A Towards Static Deadlock Resolution in the $$\pi $$-Calculus 8th International Symposium on Trustworthy Global Computing - Volume 8358, (136-155)
  124. Yoshida N, Hu R, Neykova R and Ng N The Scribble Protocol Language 8th International Symposium on Trustworthy Global Computing - Volume 8358, (22-41)
  125. Hüchting R, Majumdar R and Meyer R A theory of name boundedness Proceedings of the 24th international conference on Concurrency Theory, (182-196)
  126. Carbone M, Christensen A, Nielson F, Nielson H, Hildebrandt T and SØlvkjær M ICT-powered Health Care Processes Revised Selected Papers of the Third International Symposium on Foundations of Health Information Engineering and Systems - Volume 8315, (59-68)
  127. Franke-Arnold S, Gay S and Puthoor I Quantum process calculus for linear optical quantum computing Proceedings of the 5th international conference on Reversible Computation, (234-246)
  128. Fleischmann A, Börger E and Lerchner H Subject-Orientation as a method to specify the cooperation of active entities in the ucepcortex project Proceedings of the 6th international conference on Advances in Brain Inspired Cognitive Systems, (328-337)
  129. ACM
    Colombo C and Pace G (2013). Recovery within long-running transactions, ACM Computing Surveys, 45:3, (1-35), Online publication date: 1-Jun-2013.
  130. ACM
    Stadtmüller S, Speiser S, Harth A and Studer R Data-Fu Proceedings of the 22nd international conference on World Wide Web, (1225-1236)
  131. Gruhn H, Stöhr D, Gövercin M and Glesner S Design and verification of a health-monitoring driver assistance system Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare, (266-267)
  132. Peters K, Nestmann U and Goltz U On distributability in process calculi Proceedings of the 22nd European conference on Programming Languages and Systems, (310-329)
  133. ACM
    Kittur A, Nickerson J, Bernstein M, Gerber E, Shaw A, Zimmerman J, Lease M and Horton J The future of crowd work Proceedings of the 2013 conference on Computer supported cooperative work, (1301-1318)
  134. ACM
    Hur C, Neis G, Dreyer D and Vafeiadis V (2013). The power of parameterization in coinductive proof, ACM SIGPLAN Notices, 48:1, (193-206), Online publication date: 23-Jan-2013.
  135. ACM
    Hur C, Neis G, Dreyer D and Vafeiadis V The power of parameterization in coinductive proof Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (193-206)
  136. Nielson H and Nielson F Safety versus security in the quality calculus Theories of Programming and Formal Methods, (285-303)
  137. Leroy X Mechanized semantics for compiler verification Proceedings of the Second international conference on Certified Programs and Proofs, (4-6)
  138. ACM
    Bocq S and Daenen K (2012). Molecule, ACM SIGPLAN Notices, 47:10, (315-334), Online publication date: 15-Nov-2012.
  139. Gebler D, Hashemi V and Turrini A Computing Behavioral Relations for Probabilistic Concurrent Systems Advanced Lectures of the International Autumn School on Stochastic Model Checking. Rigorous Dependability Analysis Using Model Checking Techniques for Stochastic Systems - Volume 8453, (117-155)
  140. ACM
    Bocq S and Daenen K Molecule Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (315-334)
  141. Wong P, Albert E, Muschevici R, Proença J, Schäfer J and Schlatte R (2012). The ABS tool suite, International Journal on Software Tools for Technology Transfer (STTT), 14:5, (567-588), Online publication date: 1-Oct-2012.
  142. Amighi A, de C. Gomes P, Gurov D and Huisman M Sound control-flow graph extraction for java programs with exceptions Proceedings of the 10th international conference on Software Engineering and Formal Methods, (33-47)
  143. Ouchani S, Ait Mohamed O and Debbabi M Efficient probabilistic abstraction for SysML activity diagrams Proceedings of the 10th international conference on Software Engineering and Formal Methods, (263-277)
  144. Ciobanu G, Koutny M and Steggles J A timed mobility semantics based on rewriting strategies Proceedings of the 10th international conference on Software Engineering and Formal Methods, (141-155)
  145. Kurnia I and Poetzsch-Heffter A Verification of Open Concurrent Object Systems Revised Lectures of the 11th International Symposium on Formal Methods for Components and Objects - Volume 7866, (83-118)
  146. Huang Y, Zhao Y, Shi J, Zhu H and Qin S Investigating time properties of interrupt-driven programs Proceedings of the 15th Brazilian conference on Formal Methods: foundations and applications, (131-146)
  147. ACM
    Monjaraz R and Mariño J From the π-calculus to flat GHC Proceedings of the 14th symposium on Principles and practice of declarative programming, (163-172)
  148. ACM
    Cervesato I, Pfenning F, Sacchini J, Schürmann C and Simmons R Trace matching in a concurrent logical framework Proceedings of the seventh international workshop on Logical frameworks and meta-languages, theory and practice, (1-12)
  149. Meyer R, Khomenko V and Hüchting R A polynomial translation of π-calculus (FCP) to safe petri nets Proceedings of the 23rd international conference on Concurrency Theory, (440-455)
  150. Eid-Sabbagh R, Dijkman R and Weske M Business process architecture Proceedings of the 10th international conference on Business Process Management, (65-81)
  151. ACM
    Gupta N, Kot L, Roy S, Bender G, Gehrke J and Koch C (2012). Entangled queries, ACM Transactions on Database Systems, 37:3, (1-34), Online publication date: 1-Aug-2012.
  152. Vigliotti M Operational semantics for product-form solution Proceedings of the 9th European conference on Computer Performance Engineering, (16-31)
  153. Mamouras K, Oren S, Seeman L, Kot L and Gehrke J (2012). The complexity of social coordination, Proceedings of the VLDB Endowment, 5:11, (1172-1183), Online publication date: 1-Jul-2012.
  154. Sabel D and Schmidt-Schauβ M Conservative Concurrency in Haskell Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (561-570)
  155. Pierard A and Sumii E A Higher-Order Distributed Calculus with Name Creation Proceedings of the 2012 27th Annual IEEE/ACM Symposium on Logic in Computer Science, (531-540)
  156. Bodei C, Brodo L and Chiarugi D (2012). Control Flow Analysis of Generalised Boolean Networks, Electronic Notes in Theoretical Computer Science (ENTCS), 284:C, (3-22), Online publication date: 20-Jun-2012.
  157. Diaconescu D, Leustean I, Petre L, Sere K and Stefanescu G Refinement-Preserving translation from event-b to register-voice interactive systems Proceedings of the 9th international conference on Integrated Formal Methods, (221-236)
  158. Aman B and Ciobanu G Coordinating parallel mobile ambients to solve SAT problem in polynomial number of steps Proceedings of the 14th international conference on Coordination Models and Languages, (122-136)
  159. Aman B, Ciobanu G and Koutny M Behavioural equivalences over migrating processes with timers Proceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems, (52-66)
  160. Ksiezopolski B (2012). QoP-ML, Computers and Security, 31:4, (569-596), Online publication date: 1-Jun-2012.
  161. Bozga M, Jaber M, Maris N and Sifakis J Modeling dynamic architectures using Dy-BIP Proceedings of the 11th international conference on Software Composition, (1-16)
  162. Hirai Y A lambda calculus for gödel---dummett logic capturing waitfreedom Proceedings of the 11th international conference on Functional and Logic Programming, (151-165)
  163. ACM
    Bernardi G and Hennessy M Modelling session types using contracts Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1941-1946)
  164. ACM
    Cappello I and Quaglia P Expressing global priorities by best-matching Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1544-1550)
  165. Wirsing M, Eckhardt J, Mühlbauer T and Meseguer J Design and analysis of cloud-based architectures with KLAIM and maude Proceedings of the 9th international conference on Rewriting Logic and Its Applications, (54-82)
  166. Blanchet B Security protocol verification Proceedings of the First international conference on Principles of Security and Trust, (3-29)
  167. Kov$#225;cs M and Seidl H Runtime enforcement of information flow security in tree manipulating processes Proceedings of the 4th international conference on Engineering Secure Software and Systems, (46-59)
  168. van Bakel S (2012). Completeness and Soundness Results for X with Intersection and Union Types, Fundamenta Informaticae, 121:1-4, (1-41), Online publication date: 1-Jan-2012.
  169. ACM
    Nielson H, Nielson F and Pilegaard H (2012). Flow Logic for Process Calculi, ACM Computing Surveys, 44:1, (1-39), Online publication date: 1-Jan-2012.
  170. Grando M, Glasspool D and Fox J (2012). A formal approach to the analysis of clinical computer-interpretable guideline modeling languages, Artificial Intelligence in Medicine, 54:1, (1-13), Online publication date: 1-Jan-2012.
  171. ACM
    Vinh P Featured concurrency of mobile ad hoc computing Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia, (277-280)
  172. Cao J, Zhang F, Xu K, Liu L and Wu C (2011). Formal verification of temporal properties for reduced overhead in formal verification of temporal properties for reduced overhead in grid scientific workflows, Journal of Computer Science and Technology, 26:6, (1017-1030), Online publication date: 1-Nov-2011.
  173. Krautsevich L, Martinelli F and Yautsiukhin A A general method for assessment of security in complex services Proceedings of the 4th European conference on Towards a service-based internet, (153-164)
  174. ACM
    Im H, Nakata K, Garrigue J and Park S A syntactic type system for recursive modules Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications, (993-1012)
  175. ACM
    Im H, Nakata K, Garrigue J and Park S (2011). A syntactic type system for recursive modules, ACM SIGPLAN Notices, 46:10, (993-1012), Online publication date: 18-Oct-2011.
  176. ACM
    Blackwell C Formally modeling the electricity grid with bigraphs Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, (1-1)
  177. Guenther M and Bradley J Higher moment analysis of a spatial stochastic process algebra Proceedings of the 8th European conference on Computer Performance Engineering, (87-101)
  178. ACM
    Fisher J, Harel D and Henzinger T (2011). Biology as reactivity, Communications of the ACM, 54:10, (72-82), Online publication date: 1-Oct-2011.
  179. Matiello P and Melo A PiStache Proceedings of the 14th Brazilian Symposium on Formal Methods, Foundations and Applications - Volume 7021, (76-91)
  180. He C The decidability of the reachability problem for CCS! Proceedings of the 22nd international conference on Concurrency theory, (373-388)
  181. Mazzara M, Abouzaid F, Dragoni N and Bhattacharyya A Toward design, modelling and analysis of dynamic workflow reconfigurations Proceedings of the 8th international conference on Web Services and Formal Methods, (64-78)
  182. Clarke D, Proença J, Lazovik A and Arbab F (2011). Channel-based coordination via constraint satisfaction, Science of Computer Programming, 76:8, (681-710), Online publication date: 1-Aug-2011.
  183. ACM
    Sabel D and Schmidt-Schauß M A contextual semantics for concurrent Haskell with futures Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming, (101-112)
  184. Sakamoto Y, Tanaka Y, Yu L and Nickerson J The crowdsourcing design space Proceedings of the 6th international conference on Foundations of augmented cognition: directing the future of adaptive systems, (346-355)
  185. Siewe F, Zedan H and Cau A (2011). The Calculus of Context-aware Ambients, Journal of Computer and System Sciences, 77:4, (597-620), Online publication date: 1-Jul-2011.
  186. Letichevsky A, Letychevskyi O and Peschanenko V Insertion modeling system Proceedings of the 8th international conference on Perspectives of System Informatics, (262-273)
  187. Peschanski F, Klaudel H and Devillers R A petri net interpretation of open reconfigurable systems Proceedings of the 32nd international conference on Applications and theory of Petri Nets, (208-227)
  188. Ciobanu G and Koutny M Timed migration and interaction with access permissions Proceedings of the 17th international conference on Formal methods, (293-307)
  189. Michaelson G and Grov G Reasoning about multi-process systems with the box calculus Proceedings of the 4th Summer School conference on Central European Functional Programming School, (279-338)
  190. Butterfield A Reasoning about i/o in functional programs Proceedings of the 4th Summer School conference on Central European Functional Programming School, (93-141)
  191. ACM
    Gupta N, Kot L, Roy S, Bender G, Gehrke J and Koch C Entangled queries Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (673-684)
  192. Buscemi M, Coppo M, Dezani-Ciancaglini M and Montanari U Constraints for service contracts Proceedings of the 6th international conference on Trustworthy Global Computing, (104-120)
  193. Bono V, Capecchi S, Castellani I and Dezani-Ciancaglini M A reputation system for multirole sessions Proceedings of the 6th international conference on Trustworthy Global Computing, (1-24)
  194. ACM
    Martinelli F and Matteucci I Preserving security properties under refinement Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, (15-21)
  195. ACM
    Nielson F, Nanz S and Nielson H (2011). Modal abstractions of concurrent behavior, ACM Transactions on Computational Logic, 12:3, (1-40), Online publication date: 1-May-2011.
  196. He C, Fu Y and Fu H Decidability of behavioral equivalences in process calculi with name scoping Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering, (284-298)
  197. da Silva P and de Melo A On-the-fly verification of discrete event simulations by means of simulation purposes Proceedings of the 2011 Symposium on Theory of Modeling & Simulation: DEVS Integrative M&S Symposium, (238-247)
  198. Gorrieri R and Versari C (2011). An Operational Petri Net Semantics for A 2CCS, Fundamenta Informaticae, 109:2, (135-160), Online publication date: 1-Apr-2011.
  199. Tian C and Duan Z (2011). Expressiveness of propositional projection temporal logic with star, Theoretical Computer Science, 412:18, (1729-1744), Online publication date: 1-Apr-2011.
  200. Backes M, Maffei M, Pecina K and Reischuk R G2C Proceedings of the 2011 international conference on Theory of Security and Applications, (57-77)
  201. Koutavas V and Hennessy M A testing theory for a higher-order cryptographic language Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software, (358-377)
  202. Aristizábal A, Bonchi F, Palamidessi C, Pino L and Valencia F Deriving labels and bisimilarity for concurrent constraint programming Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software, (138-152)
  203. Piérard A and Sumii E Sound bisimulations for higher-order distributed process calculus Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software, (123-137)
  204. Bădică A and Bădică C (2011). FSP and FLTL framework for specification and verification of middle-agents, International Journal of Applied Mathematics and Computer Science, 21:1, (9-25), Online publication date: 1-Mar-2011.
  205. ACM
    Sridhar M and Hamlen K Flexible in-lined reference monitor certification Proceedings of the 5th ACM workshop on Programming languages meets program verification, (55-60)
  206. ACM
    Peschanski F Parallel computing with the Pi-calculus Proceedings of the sixth workshop on Declarative aspects of multicore programming, (45-54)
  207. Nielson H, Nielson F, Kreiker J and Pilegaard H From explicit to symbolic types for communication protocols in CCS Formal modeling, (74-89)
  208. Cappello I, Clark A, Gilmore S, Latella D, Loreti M, Quaglia P and Schivo S Quantitative analysis of services Rigorous software engineering for service-oriented systems, (522-540)
  209. Gao H, Nielson F and Nielson H Analysing protocol stacks for services Rigorous software engineering for service-oriented systems, (369-389)
  210. Fournet C, Bhargavan K and Gordon A Cryptographic verification by typing for a sample protocol implementation Foundations of security analysis and design VI, (66-100)
  211. ACM
    Sangiorgi D, Kobayashi N and Sumii E (2011). Environmental bisimulations for higher-order languages, ACM Transactions on Programming Languages and Systems, 33:1, (1-69), Online publication date: 1-Jan-2011.
  212. Bittig A and Uhrmacher A Spatial modeling in cell biology at multiple levels Proceedings of the Winter Simulation Conference, (608-619)
  213. Ma Y and Zhang M (2010). Topological Construction of Parameterized Bisimulation Limit, Electronic Notes in Theoretical Computer Science (ENTCS), 257, (55-70), Online publication date: 1-Dec-2010.
  214. Johnsen E, Hähnle R, Schäfer J, Schlatte R and Steffen M ABS Proceedings of the 9th international conference on Formal Methods for Components and Objects, (142-164)
  215. Baldan P, Bonchi F, Gadducci F and Monreale G Concurrency can't be observed, asynchronously Proceedings of the 8th Asian conference on Programming languages and systems, (424-438)
  216. Zhu H, Yang F and He J Generating denotational semantics from algebraic semantics for event-driven system-level language Proceedings of the Third international conference on Unifying theories of programming, (286-308)
  217. Jifeng H A probabilistic BPEL-like language Proceedings of the Third international conference on Unifying theories of programming, (74-100)
  218. da Silva P and de Melo A A formal environment model for multi-agent systems Proceedings of the 13th Brazilian conference on Formal methods: foundations and applications, (64-79)
  219. ACM
    Nafea I, Holton D, Younas M and Awan I Synthesis of performance management mechanisms in modern e-commerce services Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, (501-508)
  220. ACM
    Mili H, Tremblay G, Jaoude G, Lefebvre É, Elabed L and Boussaidi G (2010). Business process modeling languages, ACM Computing Surveys, 43:1, (1-56), Online publication date: 1-Nov-2010.
  221. ACM
    Kero M and Aittamaa S Scheduling garbage collection in real-time systems Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (51-60)
  222. ACM
    Angerer C and Gross T now happens-before later Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion, (3-10)
  223. Mateescu R and Salaün G Translating Pi-calculus into LOTOS NT Proceedings of the 8th international conference on Integrated formal methods, (229-244)
  224. ACM
    Kot L, Gupta N, Roy S, Gehrke J and Koch C (2010). Beyond isolation, ACM SIGMOD Record, 39:1, (27-32), Online publication date: 27-Sep-2010.
  225. ACM
    Al-Sammarraie M, Siewe F and Zedan H Formalising policies of a mLearning system using CCA Proceedings of the 4th ACM International Workshop on Context-Awareness for Self-Managing Systems, (11-19)
  226. Kanovich M, Kirigin T, Nigam V and Scedrov A Bounded memory Dolev-Yao adversaries in collaborative systems Proceedings of the 7th International conference on Formal aspects of security and trust, (18-33)
  227. Vidal J, Lama M and Bugarín A (2010). OPENET, Expert Systems with Applications: An International Journal, 37:9, (6493-6509), Online publication date: 1-Sep-2010.
  228. Delzanno G, Sangnier A and Zavattaro G Parameterized verification of ad hoc networks Proceedings of the 21st international conference on Concurrency theory, (313-327)
  229. Capecchi S, Castellani I, Dezani-Ciancaglini M and Rezk T Session types for access and information flow control Proceedings of the 21st international conference on Concurrency theory, (237-252)
  230. Berrima M and Rajeb N Linking algebraic observational equivalence and bisimulation Proceedings of the 14th international conference on Developments in language theory, (76-87)
  231. ACM
    Demeyer R, Van Assche M, Langevine L and Vanhoof W Declarative workflows to efficiently manage flexible and advanced business processes Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming, (209-218)
  232. Cardelli L and Gardner P Processes in space Proceedings of the Programs, proofs, process and 6th international conference on Computability in Europe, (78-87)
  233. ACM
    Brown R, Shoop E, Adams J, Clifton C, Gardner M, Haupt M and Hinsbeeck P Strategies for preparing computer science students for the multicore world Proceedings of the 2010 ITiCSE working group reports, (97-115)
  234. ACM
    Vecchié E, Talpin J and Boisgérault S A higher-order extension for imperative synchronous languages Proceedings of the 13th International Workshop on Software & Compilers for Embedded Systems, (1-10)
  235. ACM
    Roubtsova E, Joosten S and Wedemeijer L Behavioural model for a business rules based approach to model services Proceedings of the Second International Workshop on Behaviour Modelling: Foundation and Applications, (1-8)
  236. Nafea I, Holton D, Younas M and Awan I A formal approach to investigate the performance of modern e-commerce services Proceedings of the 17th international conference on Analytical and stochastic modeling techniques and applications, (233-246)
  237. Godskesen J Observables for mobile and wireless broadcasting systems Proceedings of the 12th international conference on Coordination Models and Languages, (1-15)
  238. Parunak H, Bisson R and Brueckner S Agent interaction, multiple perspectives, and swarming simulation Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1, (549-556)
  239. ACM
    Hernández A and García M A formal definition of RESTful semantic web services Proceedings of the First International Workshop on RESTful Design, (39-45)
  240. Bodei C, Brodo L, Degano P and Gao H (2010). Detecting and preventing type flaws at static time, Journal of Computer Security, 18:2, (229-264), Online publication date: 1-Apr-2010.
  241. ACM
    Welch P and Pedersen J (2010). Santa Claus, ACM Transactions on Programming Languages and Systems, 32:4, (1-37), Online publication date: 1-Apr-2010.
  242. Collinson M, Monahan B and Pym D Semantics for structured systems modelling and simulation Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, (1-8)
  243. He J and Hoare T (2010). CSP is a retract of CCS, Theoretical Computer Science, 411:11-13, (1311-1337), Online publication date: 1-Mar-2010.
  244. Schmidt-Schauβ M and Sabel D (2010). On generic context lemmas for higher-order calculi with sharing, Theoretical Computer Science, 411:11-13, (1521-1541), Online publication date: 1-Mar-2010.
  245. Cappello I and Quaglia P A tool for checking probabilistic properties of COWS services Proceedings of the 5th international conference on Trustworthly global computing, (364-378)
  246. Jakubův J and Wells J Expressiveness of generic process shape types Proceedings of the 5th international conference on Trustworthly global computing, (103-119)
  247. Harrison M and Massink M (2010). Modelling Interactive Experience, Function and Performance in Ubiquitous Systems, Electronic Notes in Theoretical Computer Science (ENTCS), 261, (23-42), Online publication date: 1-Feb-2010.
  248. ACM
    Barnes F and Ritson C (2010). Checking process-oriented operating system behaviour using CSP and refinement, ACM SIGOPS Operating Systems Review, 43:4, (45-49), Online publication date: 27-Jan-2010.
  249. Dezani-Ciancaglini M, Ghilezan S, Jakšić S and Pantović J Types for role-based access control of dynamic web data Proceedings of the 19th international conference on Functional and constraint logic programming, (1-29)
  250. Larcher R, Priami C and Romanel A Modelling self-assembly in BlenX Transactions on Computational Systems Biology XII, (163-198)
  251. Bruni R, Corradini A, Gadducci F, Lafuente A and Montanari U On GS-monoidal theories for graphs with nesting Graph transformations and model-driven engineering, (59-86)
  252. Baldoni M, Baroglio C, Mascardi V, Omicini A and Torroni P Agents, multi-agent systems and declarative programming A 25-year perspective on logic programming, (204-230)
  253. Finderup P, Hüttel H, Knudsen J and Nielsen J Linear uniform receptiveness in a pi-calculus with location failures Proceedings of the Sixteenth Symposium on Computing: the Australasian Theory - Volume 109, (79-88)
  254. Mazemondet O, John M, Maus C, Uhrmacher A and Rolfs A Integrating diverse reaction types into stochastic models Winter Simulation Conference, (932-943)
  255. Nielson H and Nielson F (2009). A monotone framework for CCS, Computer Languages, Systems and Structures, 35:4, (365-394), Online publication date: 1-Dec-2009.
  256. Li X, Zhang Y and Deng Y Verifying Anonymous Credential Systems in Applied Pi Calculus Proceedings of the 8th International Conference on Cryptology and Network Security, (209-225)
  257. Mura I, Prandi D, Priami C and Romanel A (2009). Exploiting non-Markovian Bio-Processes, Electronic Notes in Theoretical Computer Science (ENTCS), 253:3, (83-98), Online publication date: 1-Nov-2009.
  258. Uhrmacher A, Schulz H, Schumann H, Schwabe L and Timmermann D Regenerative systems Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, (1-10)
  259. ACM
    Barnes F and Ritson C Checking process-oriented operating system behaviour using CSP and refinement Proceedings of the Fifth Workshop on Programming Languages and Operating Systems, (1-5)
  260. ACM
    Bresciani R and Butterfield A Weakening the Dolev-Yao model through probability Proceedings of the 2nd international conference on Security of information and networks, (293-297)
  261. Collinson M and Pym D (2009). Algebra and logic for resource-based systems modelling, Mathematical Structures in Computer Science, 19:5, (959-1027), Online publication date: 1-Oct-2009.
  262. Cervesato I and Scedrov A (2009). Relating state-based and process-based concurrency through linear logic (full-version), Information and Computation, 207:10, (1044-1077), Online publication date: 1-Oct-2009.
  263. Bocchi L, Fiadeiro J, Lapadula A, Pugliese R and Tiezzi F (2009). From Architectural to Behavioural Specification of Services, Electronic Notes in Theoretical Computer Science (ENTCS), 253:1, (3-21), Online publication date: 1-Oct-2009.
  264. Walton L and Worboys M An algebraic approach to image schemas for geographic space Proceedings of the 9th international conference on Spatial information theory, (357-370)
  265. Artmann S Behavioural congruence in turing test-like human-computer interaction Proceedings of the 32nd annual German conference on Advances in artificial intelligence, (387-394)
  266. Bonchi F and Montanari U Coalgebraic symbolic semantics Proceedings of the 3rd international conference on Algebra and coalgebra in computer science, (173-190)
  267. ACM
    Falaschi M, Olarte C and Palamidessi C A framework for abstract interpretation of timed concurrent constraint programs Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming, (207-218)
  268. Dragoni N and Mazzara M A formal semantics for the WS-BPEL recovery framework Proceedings of the 6th international conference on Web services and formal methods, (92-109)
  269. Stannett M (2009). The computational status of physics, Natural Computing: an international journal, 8:3, (517-538), Online publication date: 1-Sep-2009.
  270. Frisco P Conformon p systems and topology of information flow Proceedings of the 10th international conference on Membrane Computing, (30-53)
  271. Cheng X and Yang Z Distributed traffic signal control approach based on multi-agent Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 5, (582-587)
  272. Meyer R, Khomenko V and Strazny T (2009). A Practical Approach to Verification of Mobile Systems Using Net Unfoldings, Fundamenta Informaticae, 94:3-4, (439-471), Online publication date: 1-Aug-2009.
  273. Llana L and Núuñez M (2009). Testing Semantics for RTPA, Fundamenta Informaticae, 90:3, (305-335), Online publication date: 1-Aug-2009.
  274. Meyer R, Khomenko V and Strazny T (2009). A Practical Approach to Verification of Mobile Systems Using Net Unfoldings, Fundamenta Informaticae, 94:3-4, (439-471), Online publication date: 1-Aug-2009.
  275. Barbosa M and Barbosa L (2009). A perspective on service orchestration, Science of Computer Programming, 74:9, (671-687), Online publication date: 1-Jul-2009.
  276. Hennessy M and Gaur M (2009). Counting the Cost in the Picalculus (Extended Abstract), Electronic Notes in Theoretical Computer Science (ENTCS), 229:3, (117-129), Online publication date: 1-Jul-2009.
  277. Godskesen J (2009). A Calculus for Mobile Ad-hoc Networks with Static Location Binding, Electronic Notes in Theoretical Computer Science (ENTCS), 242:1, (161-183), Online publication date: 1-Jul-2009.
  278. Bundgaard M, Godskesen J, Haagensen B and Hüttel H (2009). Decidable Fragments of a Higher Order Calculus with Locations, Electronic Notes in Theoretical Computer Science (ENTCS), 242:1, (113-138), Online publication date: 1-Jul-2009.
  279. Bonchi F, Gadducci F and Monreale G (2009). Labelled Transitions for Mobile Ambients (As Synthesized via a Graphical Encoding), Electronic Notes in Theoretical Computer Science (ENTCS), 242:1, (73-98), Online publication date: 1-Jul-2009.
  280. ACM
    DeVries B, Gupta G, Hamlen K, Moore S and Sridhar M ActionScript bytecode verification with co-logic programming Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, (9-15)
  281. Kitchin D, Quark A, Cook W and Misra J The Orc Programming Language Proceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems, (1-25)
  282. ACM
    Cook W, Tilevich E, Ibrahim A and Wiedermann B Language design for distributed objects Proceedings of the 1st International Workshop on Distributed Objects for the 21st Century, (1-4)
  283. ACM
    Ko R (2009). A computer scientist's introductory guide to business process management (BPM), XRDS: Crossroads, The ACM Magazine for Students, 15:4, (11-18), Online publication date: 1-Jun-2009.
  284. Bonnici E and Welch P Mobile processes, mobile channels and complex dynamic systems Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (232-239)
  285. Sampson A, Bjørndalen J and Andrews P Birds on the wall Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (225-231)
  286. Garcia J A specification language for information security policies Proceedings of the international conference on Computational and information science 2009, (437-440)
  287. ACM
    Vianu V Automatic verification of database-driven systems Proceedings of the 12th International Conference on Database Theory, (1-13)
  288. Bonchi F, Gadducci F and Monreale G Reactive Systems, Barbed Semantics, and the Mobile Ambients Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (272-287)
  289. Llana L and Núuñez M (2009). Testing Semantics for RTPA, Fundamenta Informaticae, 90:3, (305-335), Online publication date: 1-Mar-2009.
  290. Zhou J and Zeng G (2009). A mechanism for grid service composition behavior specification and verification, Future Generation Computer Systems, 25:3, (378-383), Online publication date: 1-Mar-2009.
  291. Souilah I, Francalanza A and Sassone V A formal model of provenance in distributed systems First workshop on on Theory and practice of provenance, (1-11)
  292. Klin B (2009). Bialgebraic methods and modal logic in structural operational semantics, Information and Computation, 207:2, (237-257), Online publication date: 1-Feb-2009.
  293. Cappello I and Quaglia P (2009). A Translation of Beta-binders in a Prioritized Pi-calculus, Electronic Notes in Theoretical Computer Science (ENTCS), 229:1, (109-125), Online publication date: 1-Feb-2009.
  294. Schäfer A and John M Conceptional modeling and analysis of spatio-temporal processes in biomolecular systems Proceedings of the Sixth Asia-Pacific Conference on Conceptual Modeling - Volume 96, (39-48)
  295. Demangeon R, Hirschkoff D and Sangiorgi D Mobile processes and termination Semantics and algebraic specification, (250-273)
  296. Bezerra J and Hirata C (2009). A polyadic pi-calculus approach for the formal specification of UML-RT, Advances in Software Engineering, 2009, (1-16), Online publication date: 1-Jan-2009.
  297. Bodei C, Bracciali A and Chiarugi D (2009). Control Flow Analysis for Brane Calculi, Electronic Notes in Theoretical Computer Science (ENTCS), 227, (59-75), Online publication date: 1-Jan-2009.
  298. Wang J and Wysk R A Pi-calculus formalism for discrete event simulation Proceedings of the 40th Conference on Winter Simulation, (703-711)
  299. ACM
    Bhargavan K, Fournet C, Gordon A and Tse S (2008). Verified interoperable implementations of security protocols, ACM Transactions on Programming Languages and Systems, 31:1, (1-61), Online publication date: 1-Dec-2008.
  300. ACM
    Crouzen P, van de Pol J and Rensink A (2008). Applying formal methods to gossiping networks with mCRL and groove, ACM SIGMETRICS Performance Evaluation Review, 36:3, (7-16), Online publication date: 30-Nov-2008.
  301. ACM
    Bhattacharyya A and Fitzgerald J Development of a formalism for modelling and analysis of dynamic reconfiguration of dependable real-time systems Proceedings of the 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, (67-72)
  302. Leye S, Uhrmacher A and Priami C A Bounded-Optimistic, Parallel Beta-Binders Simulator Proceedings of the 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, (139-148)
  303. Krivine J, Milner R and Troina A (2008). Stochastic Bigraphs, Electronic Notes in Theoretical Computer Science (ENTCS), 218, (73-96), Online publication date: 1-Oct-2008.
  304. Kordon F and Thierry-Mieg Y Experiences in model driven verification of behavior with UML Proceedings of the 15th Monterey conference on Foundations of Computer Software: future Trends and Techniques for Development, (181-200)
  305. Zhu H, He J, Peng X and Jin N Denotational approach to an event-driven system-level language Proceedings of the 2nd international conference on Unifying theories of programming, (258-278)
  306. He J Transaction calculus Proceedings of the 2nd international conference on Unifying theories of programming, (2-21)
  307. Li J, Zhu H and He J An Observational Model for Transactional Calculus of Services Orchestration Proceedings of the 5th international colloquium on Theoretical Aspects of Computing, (201-215)
  308. ACM
    Emmerich W, Aoyama M and Sventek J (2008). The impact of research on the development of middleware technology, ACM Transactions on Software Engineering and Methodology, 17:4, (1-48), Online publication date: 1-Aug-2008.
  309. Kitchin D, Powell E and Misra J Simulation Using Orchestration Proceedings of the 12th international conference on Algebraic Methodology and Software Technology, (2-15)
  310. Gao H, Bodei C and Degano P A Formal Analysis of Complex Type Flaw Attacks on Security Protocols Proceedings of the 12th international conference on Algebraic Methodology and Software Technology, (167-183)
  311. Wehrman I, Kitchin D, Cook W and Misra J (2008). A timed semantics of Orc, Theoretical Computer Science, 402:2-3, (234-248), Online publication date: 20-Jul-2008.
  312. Nanz S, Nielson F and Riis Nielson H Modal Abstractions of Concurrent Behaviour Proceedings of the 15th international symposium on Static Analysis, (159-173)
  313. ACM
    Olarte C and Valencia F The expressivity of universal timed CCP Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming, (8-19)
  314. Majumdar A, Sowa J and Stewart J Pursuing the Goal of Language Understanding Proceedings of the 16th international conference on Conceptual Structures: Knowledge Visualization and Reasoning, (21-42)
  315. Barbuti R, Maggiolo-Schettini A, Milazzo P and Troina A (2008). Bisimulations in calculi modelling membranes, Formal Aspects of Computing, 20:4-5, (351-377), Online publication date: 1-Jul-2008.
  316. Bouroulet R, Devillers R, Klaudel H, Pelz E and Pommereau F Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets Proceedings of the 29th international conference on Applications and Theory of Petri Nets, (72-91)
  317. Meyer R, Khomenko V and Strazny T A Practical Approach to Verification of Mobile Systems Using Net Unfoldings Proceedings of the 29th international conference on Applications and Theory of Petri Nets, (327-347)
  318. Prandi D, Quaglia P and Zannone N Formal analysis of BPMN via a translation into COWS Proceedings of the 10th international conference on Coordination models and languages, (249-263)
  319. Versari C and Gorrieri R π@ Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (449-506)
  320. Ciocchetta F and Hillston J Process algebras in systems biology Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (265-312)
  321. Păun G and Romero-Campero F Membrane computing as a modeling framework Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (168-214)
  322. Maus C, John M, Röhl M and Uhrmacher A Hierarchical modeling for computational biology Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (81-124)
  323. Talcott C Pathway logic Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology, (21-53)
  324. Lv C, Wang J, Liu L and You W The separation of duty with privilege calculus Proceedings of the 3rd international conference on Rough sets and knowledge technology, (410-417)
  325. ACM
    Grogono P and Shearing B Concurrent software engineering Proceedings of the 2008 C3S2E conference, (99-108)
  326. Tian C and Duan Z Propositional projection temporal logic, Büchi automata and ω-regular expressions Proceedings of the 5th international conference on Theory and applications of models of computation, (47-58)
  327. Balasubramaniam D, Dearle A and Morrison R A composition-based approach to the construction and dynamic reconfiguration of wireless sensor network applications Proceedings of the 7th international conference on Software composition, (206-214)
  328. Ciobanu G and Koutny M Modelling and verification of timed interaction and migration Proceedings of the Theory and practice of software, 11th international conference on Fundamental approaches to software engineering, (215-229)
  329. Bonchi F and Montanari U Symbolic semantics revisited Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures, (395-412)
  330. ACM
    Olarte C and Valencia F Universal concurrent constraint programing Proceedings of the 2008 ACM symposium on Applied computing, (145-150)
  331. ACM
    Gilmore S and Hillston J (2008). Performance evaluation comes to life, ACM SIGMETRICS Performance Evaluation Review, 35:4, (3-13), Online publication date: 1-Mar-2008.
  332. Stark I (2008). Free-algebra models for the π -calculus, Theoretical Computer Science, 390:2-3, (248-270), Online publication date: 20-Jan-2008.
  333. Jeffrey A and Rathke J (2008). Full abstraction for polymorphic π-calculus, Theoretical Computer Science, 390:2-3, (171-196), Online publication date: 20-Jan-2008.
  334. Danos V, Feret J, Fontana W and Krivine J Abstract interpretation of cellular signalling networks Proceedings of the 9th international conference on Verification, model checking, and abstract interpretation, (83-97)
  335. Huang X, Jiao L and Lu W Weak parametric failure equivalences and their congruence formats Proceedings of the fourteenth symposium on Computing: the Australasian theory - Volume 77, (15-26)
  336. Ciocchetta F, Priami C and Quaglia P (2008). An Automatic Translation of SBML into Beta-Binders, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 5:1, (80-90), Online publication date: 1-Jan-2008.
  337. Phillips I and Vigliotti M (2008). Symmetric electoral systems for ambient calculi, Information and Computation, 206:1, (34-72), Online publication date: 1-Jan-2008.
  338. van Hee K, Oanea O, Serebrenik A, Sidorova N and Voorhoeve M (2008). History-based joins, Data & Knowledge Engineering, 64:1, (24-37), Online publication date: 1-Jan-2008.
  339. Freitas L and Woodcock J (2007). Mechanising Mondex with Z/Eves, Formal Aspects of Computing, 20:1, (117-139), Online publication date: 1-Jan-2008.
  340. Gao H, Bodei C, Degano P and Nielson H A formal analysis for capturing replay attacks in cryptographic protocols Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security, (150-165)
  341. Miller T and McBurney P (2007). A formal semantics for Gaia liveness rules and expressions, International Journal of Agent-Oriented Software Engineering, 1:3/4, (435-476), Online publication date: 1-Dec-2007.
  342. Doi T and Honiden S (2007). IOM/T: interaction-oriented model by textual notation, International Journal of Agent-Oriented Software Engineering, 1:3/4, (266-294), Online publication date: 1-Dec-2007.
  343. Vigliotti M, Phillips I and Palamidessi C (2007). Tutorial on separation results in process calculi via leader election problems, Theoretical Computer Science, 388:1-3, (267-289), Online publication date: 1-Dec-2007.
  344. Aranda J, Di Giusto C, Nielsen M and Valencia F CCS with replication in the Chomsky hierarchy Proceedings of the 5th Asian conference on Programming languages and systems, (383-398)
  345. Goubault-Larrecq J, Palamidessi C and Troina A A probabilistic applied pi-calculus Proceedings of the 5th Asian conference on Programming languages and systems, (175-190)
  346. Danos V, Feret J, Fontana W and Krivine J Scalable simulation of cellular signaling networks Proceedings of the 5th Asian conference on Programming languages and systems, (139-157)
  347. Aranda J, Di Giusto C, Nielsen M and Valencia F CCS with Replication in the Chomsky Hierarchy: The Expressive Power of Divergence Programming Languages and Systems, (383-398)
  348. Goubault-Larrecq J, Palamidessi C and Troina A A Probabilistic Applied Pi–Calculus Programming Languages and Systems, (175-190)
  349. Pesic M, Schonenberg M, Sidorova N and Van Der Aalst W Constraint-based workflow models Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I, (77-94)
  350. Bruni R, Lafuente A, Montanari U and Tuosto E Service oriented architectural design Proceedings of the 3rd conference on Trustworthy global computing, (186-203)
  351. Nielson F, Nielson H, Bauer J, Nielsen C and Pilegaard H Relational analysis for delivery of services Proceedings of the 3rd conference on Trustworthy global computing, (73-89)
  352. Bodei C, Degano P, Gao H and Brodo L (2007). Detecting and Preventing Type flaws, Electronic Notes in Theoretical Computer Science (ENTCS), 194:1, (3-22), Online publication date: 1-Nov-2007.
  353. ACM
    Kero M, Nordlander J and Lindgren P A correct and useful incremental copying garbage collector Proceedings of the 6th international symposium on Memory management, (129-140)
  354. ACM
    Sumii E and Pierce B (2007). A bisimulation for type abstraction and recursion, Journal of the ACM, 54:5, (26-es), Online publication date: 1-Oct-2007.
  355. Sobociński P (2007). A Well-behaved LTS for the Pi-calculus, Electronic Notes in Theoretical Computer Science (ENTCS), 192:1, (5-11), Online publication date: 1-Oct-2007.
  356. Martinelli F and Matteucci I Synthesis of web services orchestrators in a timed setting Proceedings of the 4th international conference on Web services and formal methods, (124-138)
  357. Li Q, Zhu H, Li J and He J Scalable formalization of publish/subscribe messaging scheme based on message brokers Proceedings of the 4th international conference on Web services and formal methods, (61-76)
  358. Aman B and Ciobanu G Mobile ambients with timers and types Proceedings of the 4th international conference on Theoretical aspects of computing, (50-63)
  359. Manset D, Verjus H and McClatchey R Managing separation of concerns in grid applications through architectural model transformations Proceedings of the First European conference on Software Architecture, (308-312)
  360. Morrison R, Balasubramaniam D, Oquendo F, Warboys B and Greenwood R An active architecture approach to dynamic systems co-evolution Proceedings of the First European conference on Software Architecture, (2-10)
  361. Verhulst E and De Jong G OpenComRTOS Proceedings of the 13th international SDL Forum conference on Design for dependable systems, (258-271)
  362. Curbera F, Duftler M, Khalaf R and Lovell D Bite Proceedings of the 5th international conference on Service-Oriented Computing, (94-106)
  363. Prandi D and Quaglia P Stochastic COWS Proceedings of the 5th international conference on Service-Oriented Computing, (245-256)
  364. Versari C, Busi N and Gorrieri R On the expressive power of global and local priority in process calculi Proceedings of the 18th international conference on Concurrency Theory, (241-255)
  365. Danos V, Feret J, Fontana W, Harmer R and Krivine J Rule-based modelling of cellular signalling Proceedings of the 18th international conference on Concurrency Theory, (17-41)
  366. Aman B and Ciobanu G Timers and proximities for mobile ambients Proceedings of the Second international conference on Computer Science: theory and applications, (33-43)
  367. Burgin M and Calude C (2007). Preface, Theoretical Computer Science, 383:2-3, (111-114), Online publication date: 3-Sep-2007.
  368. Eberbach E (2007). The $-calculus process algebra for problem solving, Theoretical Computer Science, 383:2-3, (200-243), Online publication date: 3-Sep-2007.
  369. ACM
    Ren S, Yu Y, Chen N, Tsai J and Kwiat K (2007). The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems, ACM Transactions on Autonomous and Adaptive Systems, 2:3, (10-es), Online publication date: 1-Sep-2007.
  370. Aldinucci M, Danelutto M and Kilpatrick P Management in distributed systems Proceedings of the 13th international Euro-Par conference on Parallel Processing, (651-661)
  371. Gadducci F and Lafuente A Graphical encoding of a spatial logic for the π-calculus Proceedings of the 2nd international conference on Algebra and coalgebra in computer science, (209-225)
  372. König B Deriving bisimulation congruences with borrowed contexts Proceedings of the 2nd international conference on Algebra and coalgebra in computer science, (36-39)
  373. Prost F Taming non-compositionality using new binders Proceedings of the 6th international conference on Unconventional Computation, (150-162)
  374. ACM
    Fournet C, Gordon A and Maffeis S (2007). A type discipline for authorization policies, ACM Transactions on Programming Languages and Systems, 29:5, (25-es), Online publication date: 2-Aug-2007.
  375. Toben T Non-interference properties for data-type reduction of communicating systems Proceedings of the 6th international conference on Integrated formal methods, (619-638)
  376. Jifeng H UTP semantics for web services Proceedings of the 6th international conference on Integrated formal methods, (353-372)
  377. Guerriero M, Priami C and Romanel A Modeling static biological compartments with beta-binders Proceedings of the 2nd international conference on Algebraic biology, (247-261)
  378. Lafuente A Towards model checking spatial properties with SPIN Proceedings of the 14th international SPIN conference on Model checking software, (223-242)
  379. Chalub F and Braga C (2007). Maude MSOS Tool, Electronic Notes in Theoretical Computer Science (ENTCS), 176:4, (133-146), Online publication date: 1-Jul-2007.
  380. Jacquet J and Linden I Towards a theory of refinement in timed coordination languages Proceedings of the 9th international conference on Coordination models and languages, (113-131)
  381. ACM
    Burato E and Cristani M Contract clause negotiation by game theory Proceedings of the 11th international conference on Artificial intelligence and law, (71-80)
  382. Cervesato I and Stehr M (2007). Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types, Higher-Order and Symbolic Computation, 20:1-2, (3-35), Online publication date: 1-Jun-2007.
  383. ACM
    Granell C, Gould M, Llidó D and Berlanga R A model-driven approach for reusing service compositions Proceedings of the 2007 Euro American conference on Telematics and information systems, (1-8)
  384. ACM
    Bhargavan K, Corin R, Fournet C and Gordon A (2007). Secure sessions for Web services, ACM Transactions on Information and System Security, 10:2, (8-es), Online publication date: 1-May-2007.
  385. Pilegaard H, Nielson F and Nielson H (2007). Active Evaluation Contexts for Reaction Semantics, Electronic Notes in Theoretical Computer Science (ENTCS), 175:1, (57-70), Online publication date: 1-May-2007.
  386. Sumii E and Pierce B (2007). A bisimulation for dynamic sealing, Theoretical Computer Science, 375:1-3, (169-192), Online publication date: 20-Apr-2007.
  387. Merelli E and Young M (2007). Validating MAS simulation models with mutation, Multiagent and Grid Systems, 3:2, (225-243), Online publication date: 1-Apr-2007.
  388. Niehren J, Sabel D, Schmidt-Schauß M and Schwinghammer J (2007). Observational Semantics for a Concurrent Lambda Calculus with Reference Cells and Futures, Electronic Notes in Theoretical Computer Science (ENTCS), 173, (313-337), Online publication date: 1-Apr-2007.
  389. Pym D and Tofts C (2007). Systems Modelling via Resources and Processes, Electronic Notes in Theoretical Computer Science (ENTCS), 172, (545-587), Online publication date: 1-Apr-2007.
  390. Cardelli L, Gardner P and Ghelli G (2007). Manipulating Trees with Hidden Labels, Electronic Notes in Theoretical Computer Science (ENTCS), 172, (177-201), Online publication date: 1-Apr-2007.
  391. Wong P and Gibbons J A process-algebraic approach to workflow specification and refinement Proceedings of the 6th international conference on Software composition, (51-65)
  392. Suenaga K and Kobayashi N Type-based analysis of deadlock for a concurrent calculus with interrupts Proceedings of the 16th European Symposium on Programming, (490-504)
  393. Versari C A core calculus for a comparative analysis of bio-inspired calculi Proceedings of the 16th European Symposium on Programming, (411-425)
  394. Deng Y and Palamidessi C (2007). Axiomatizations for probabilistic finite-state behaviors, Theoretical Computer Science, 373:1-2, (92-114), Online publication date: 10-Mar-2007.
  395. Engelfriet J and Gelsema T (2007). An exercise in structural congruence, Information Processing Letters, 101:1, (1-5), Online publication date: 16-Jan-2007.
  396. Priami C Computational thinking in biology Transactions on computational systems biology VIII, (63-76)
  397. Nielson H and Nielson F Data flow analysis for CCS Program analysis and compilation, theory and practice, (311-327)
  398. Jifeng H Compensable programs Formal methods and hybrid real-time systems, (349-363)
  399. Estevez E and Janowski T Programmable messaging for electronic government - building a foundation Formal methods and hybrid real-time systems, (217-236)
  400. ACM
    Emmerich W, Aoyama M and Sventek J (2007). The impact of research on middleware technology, ACM SIGOPS Operating Systems Review, 41:1, (89-112), Online publication date: 1-Jan-2007.
  401. ACM
    Emmerich W, Aoyama M and Sventek J (2007). The impact of research on middleware technology, ACM SIGSOFT Software Engineering Notes, 32:1, (21-46), Online publication date: 1-Jan-2007.
  402. ACM
    Eugster P (2007). Type-based publish/subscribe, ACM Transactions on Programming Languages and Systems, 29:1, (6-es), Online publication date: 1-Jan-2007.
  403. Schäfer A (2007). Axiomatisation and decidability of multi-dimensional Duration Calculus, Information and Computation, 205:1, (25-64), Online publication date: 1-Jan-2007.
  404. Stewart A, Gabarró J, Clint M, Harmer T, Kilpatrick P and Perrott R Managing grid computations Proceedings of the 4th international conference on Parallel and Distributed Processing and Applications, (278-291)
  405. Fisher J and Henzinger T Executable biology Proceedings of the 38th conference on Winter simulation, (1675-1682)
  406. Guillen-Scholten J, Arbab F, de Boer F and Bonsangue M (2006). A Component Coordination Model Based on Mobile Channels, Fundamenta Informaticae, 73:4, (561-582), Online publication date: 1-Dec-2006.
  407. ACM
    Rajsbaum S (2006). ACM SIGACT news distributed computing column 24, ACM SIGACT News, 37:4, (58-84), Online publication date: 1-Dec-2006.
  408. Barrett C, Hunt H, Marathe M, Ravi S, Rosenkrantz D and Stearns R (2006). Complexity of reachability problems for finite discrete dynamical systems, Journal of Computer and System Sciences, 72:8, (1317-1345), Online publication date: 1-Dec-2006.
  409. Gruhn V and Schäfer C Using mobile architecture modeling and simulation for enterprise applications Proceedings of the 2nd international conference on Trends in enterprise application architecture, (142-157)
  410. Gruhn V and Schäfer C Using Mobile Architecture Modeling and Simulation for Enterprise Applications Trends in Enterprise Application Architecture, (142-157)
  411. Quesel J and Schäfer A Spatio-temporal model checking for mobile real-time systems Proceedings of the Third international conference on Theoretical Aspects of Computing, (347-361)
  412. Johnsen E, Owe O and Yu I (2006). Creol, Theoretical Computer Science, 365:1, (23-66), Online publication date: 10-Nov-2006.
  413. Aranda J, Di Giusto C, Palamidessi C and Valencia F On recursion, replication and scope mechanisms in process calculi Proceedings of the 5th international conference on Formal methods for components and objects, (185-206)
  414. Acciai L, Boreale M and Dal Zilio S A typed calculus for querying distributed XML documents Proceedings of the 2nd international conference on Trustworthy global computing, (167-182)
  415. Kifor T, Varga L, Vazquez-Salceda J, Alvarez S, Willmott S, Miles S and Moreau L (2006). Provenance in Agent-Mediated Healthcare Systems, IEEE Intelligent Systems, 21:6, (38-46), Online publication date: 1-Nov-2006.
  416. Dong J, Liu Y, Sun J and Zhang X Verification of computation orchestration via timed automata Proceedings of the 8th international conference on Formal Methods and Software Engineering, (226-245)
  417. Guillen-Scholten J, Arbab F, de Boer F and Bonsangue M (2006). A Component Coordination Model Based on Mobile Channels, Fundamenta Informaticae, 73:4, (561-582), Online publication date: 30-Oct-2006.
  418. ACM
    Tardieu O and Edwards S Scheduling-independent threads and exceptions in SHIM Proceedings of the 6th ACM & IEEE International conference on Embedded software, (142-151)
  419. Chiarugi D, Chinellato M, Degano P, Brutto G and Marangoni R Feedbacks and oscillations in the virtual cell VICE Proceedings of the 2006 international conference on Computational Methods in Systems Biology, (93-107)
  420. Prandi D A formal approach to molecular docking Proceedings of the 2006 international conference on Computational Methods in Systems Biology, (78-92)
  421. ACM
    Delamare F, Dotti F, Fernandes P, Nunes C and Ost L Analytical modeling of random waypoint mobility patterns Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks, (106-113)
  422. Stefanescu G (2006). Interactive Systems with Registers and Voices, Fundamenta Informaticae, 73:1,2, (285-305), Online publication date: 1-Oct-2006.
  423. Bohnenkamp H, D'Argenio P, Hermanns H and Katoen J (2006). MODEST, IEEE Transactions on Software Engineering, 32:10, (812-830), Online publication date: 1-Oct-2006.
  424. Margaria T and Steffen B (2006). Service Engineering, Computer, 39:10, (45-55), Online publication date: 1-Oct-2006.
  425. ACM
    Nakata K and Garrigue J Recursive modules for programming Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming, (74-86)
  426. ACM
    Nakata K and Garrigue J (2006). Recursive modules for programming, ACM SIGPLAN Notices, 41:9, (74-86), Online publication date: 16-Sep-2006.
  427. Miller T and McBurney P Using constraints and process algebra for specification of first-class agent interaction protocols Proceedings of the 7th international conference on Engineering societies in the agents world VII, (245-264)
  428. van Hee K, Oanea O, Serebrenik A, Sidorova N and Voorhoeve M History-based joins Proceedings of the 4th international conference on Business Process Management, (225-240)
  429. Pesic M and van der Aalst W A declarative approach for flexible business processes management Proceedings of the 2006 international conference on Business Process Management Workshops, (169-180)
  430. ACM
    Canetti R (2006). Security and composition of cryptographic protocols, ACM SIGACT News, 37:3, (67-92), Online publication date: 1-Sep-2006.
  431. Nestmann U Welcome to the jungle Proceedings of the 17th international conference on Concurrency Theory, (52-63)
  432. Kitchin D, Cook W and Misra J A language for task orchestration and its semantic properties Proceedings of the 17th international conference on Concurrency Theory, (477-491)
  433. Matteucci I A tool for the synthesis of controller programs Proceedings of the 4th international conference on Formal aspects in security and trust, (112-126)
  434. Wang M, Jin L and Liu L A description method of ontology change management using pi-calculus Proceedings of the First international conference on Knowledge Science, Engineering and Management, (477-489)
  435. Hinze T, Lenser T and Dittrich P A protein substructure based p system for description and analysis of cell signalling networks Proceedings of the 7th international conference on Membrane Computing, (409-423)
  436. Ding J, Clarke P, Xu D, He X and Deng Y (2006). A formal model-based approach for developing an interoperable mobile agent system, Multiagent and Grid Systems, 2:4, (401-412), Online publication date: 1-Jul-2006.
  437. Deng Y and Sangiorgi D (2006). Ensuring termination by typability, Information and Computation, 204:7, (1045-1082), Online publication date: 1-Jul-2006.
  438. Ciobanu G and Zakharov V Encoding mobile ambients into the π-calculus Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics, (148-165)
  439. Gönczy L, Chiaradonna S, Di Giandomenico F, Pataricza A, Bondavalli A and Bartha T Dependability evaluation of web service-based processes Proceedings of the Third European conference on Formal Methods and Stochastic Models for Performance Evaluation, (166-180)
  440. Raja N and Shyamasundar R (2006). A closer look at constraints as processes, Information Processing Letters, 98:5, (206-210), Online publication date: 15-Jun-2006.
  441. ACM
    Peschanski F and Hym S A stackless runtime environment for a Pi-calculus Proceedings of the 2nd international conference on Virtual execution environments, (57-67)
  442. Sangiorgi D The bisimulation proof method Proceedings of the 8th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems, (18-19)
  443. Bocchi L and Lucchi R Atomic commit and negotiation in service oriented computing Proceedings of the 8th international conference on Coordination Models and Languages, (16-27)
  444. Nielsen C and Nielson H (2006). Static analysis for blinding, Nordic Journal of Computing, 13:1, (98-116), Online publication date: 1-Jun-2006.
  445. Murakami M (2006). A formal model of concurrent systems based on bipartite directed acyclic graph, Science of Computer Programming, 61:1, (38-47), Online publication date: 1-Jun-2006.
  446. Bundgaard M, Hildebrandt T and Godskesen J (2006). A CPS encoding of name-passing in higher-order mobile embedded resources, Theoretical Computer Science, 356:3, (422-439), Online publication date: 30-May-2006.
  447. Phillips I and Vigliotti M (2006). Leader election in rings of ambient processes, Theoretical Computer Science, 356:3, (468-494), Online publication date: 30-May-2006.
  448. ACM
    Dong J From semantic web to expressive software specifications Proceedings of the 28th international conference on Software engineering, (1063-1064)
  449. ACM
    Atkinson C, Stoll D, Acker H, Dadam P, Lauer M and Reichert M Separating per-client and pan-client views in service specification Proceedings of the 2006 international workshop on Service-oriented software engineering, (47-53)
  450. Abouzaid F A Mapping from Pi-Calculus into BPEL Proceedings of the 2006 conference on Leading the Web in Concurrent Engineering: Next Generation Concurrent Engineering, (235-242)
  451. Himmelspach J, Lecca P, Prandi D, Priami C, Quaglia P and Uhrmacher A Developing An Hierarchical Simulator for Beta-binders Proceedings of the 20th Workshop on Principles of Advanced and Distributed Simulation, (92-102)
  452. ACM
    Solanki M, Cau A and Zedan H ASDL Proceedings of the 15th international conference on World Wide Web, (687-696)
  453. Briot J, Meurisse T and Peschanski F Architectural design of component-based agents Proceedings of the 4th international conference on Programming multi-agent systems, (71-90)
  454. Zhang J and Wang H A pi-calculus-based business process formal design method Proceedings of the 10th international conference on Computer supported cooperative work in design III, (347-356)
  455. ACM
    Oquendo F (2006). π-Method, ACM SIGSOFT Software Engineering Notes, 31:3, (1-13), Online publication date: 1-May-2006.
  456. Varacca D and Yoshida N (2006). Typed Event Structures and the π-Calculus, Electronic Notes in Theoretical Computer Science (ENTCS), 158, (373-397), Online publication date: 1-May-2006.
  457. Peschanski F (2006). Mobile Agents in Interaction Spaces, Electronic Notes in Theoretical Computer Science (ENTCS), 154:1, (63-82), Online publication date: 1-May-2006.
  458. Ziegler A, Miller D and Palamidessi C (2006). A Congruence Format for Name-passing Calculi, Electronic Notes in Theoretical Computer Science (ENTCS), 156:1, (169-189), Online publication date: 1-May-2006.
  459. Hym S and Hennessy M (2006). Adding Recursion to Dpi, Electronic Notes in Theoretical Computer Science (ENTCS), 156:1, (115-133), Online publication date: 1-May-2006.
  460. Gilmore S, Haenel V, Hillston J and Tenzer J A design environment for mobile applications Proceedings of the 20th international conference on Parallel and distributed processing, (326-326)
  461. Stefanescu G (2006). Interactive Systems with Registers and Voices, Fundamenta Informaticae, 73:1,2, (285-305), Online publication date: 1-Apr-2006.
  462. ACM
    Blass A and Gurevich Y (2006). Ordinary interactive small-step algorithms, I, ACM Transactions on Computational Logic, 7:2, (363-419), Online publication date: 1-Apr-2006.
  463. Kratz F, Sokolsky O, Pappas G and Lee I R-Charon, a modeling language for reconfigurable hybrid systems Proceedings of the 9th international conference on Hybrid Systems: computation and control, (392-406)
  464. Zunino R and Degano P Handling exp, χ (and timestamps) in protocol analysis Proceedings of the 9th European joint conference on Foundations of Software Science and Computation Structures, (413-427)
  465. Zhu Z (2006). Similarity between preferential models, Theoretical Computer Science, 353:1, (26-52), Online publication date: 14-Mar-2006.
  466. ACM
    Lumpe M and Schneider J (2005). Classboxes, ACM SIGSOFT Software Engineering Notes, 31:2, (6-es), Online publication date: 1-Mar-2006.
  467. ACM
    Ciobanu G and Lucanu D (2005). A specification language for coordinated objects, ACM SIGSOFT Software Engineering Notes, 31:2, (3-es), Online publication date: 1-Mar-2006.
  468. ACM
    Mateescu R and Oquendo F (2006). π-AAL, ACM SIGSOFT Software Engineering Notes, 31:2, (1-19), Online publication date: 1-Mar-2006.
  469. Deng Y and Sangiorgi D (2006). Towards an algebraic theory of typed mobile processes, Theoretical Computer Science, 350:2, (188-212), Online publication date: 7-Feb-2006.
  470. Phillips A, Cardelli L and Castagna G A graphical representation for biological processes in the stochastic pi-calculus Transactions on Computational Systems Biology VII, (123-152)
  471. Eccher C and Lecca P Translating SBML models into the stochastic π-calculus for stochastic simulation Transactions on Computational Systems Biology VII, (73-88)
  472. Kuttler C and Niehren J Gene regulation in the pi calculus Transactions on Computational Systems Biology VII, (24-55)
  473. Blossey R, Cardelli L and Phillips A A compositional approach to the stochastic dynamics of gene networks Transactions on Computational Systems Biology IV, (99-122)
  474. Pérez-Jiménez M and Romero-Campero F P systems, a new computational modelling tool for systems biology Transactions on Computational Systems Biology VI, (176-197)
  475. Kuttler C Simulating bacterial transcription and translation in a stochastic π calculus Transactions on Computational Systems Biology VI, (113-149)
  476. Milner R (2006). Pure bigraphs, Information and Computation, 204:1, (60-122), Online publication date: 1-Jan-2006.
  477. ACM
    Oquendo F (2006). Formally modelling software architectures with the UML 2.0 profile for π-ADL, ACM SIGSOFT Software Engineering Notes, 31:1, (1-13), Online publication date: 1-Jan-2006.
  478. Song H, Compton K and Rounds W (2006). SPHIN, Electronic Notes in Theoretical Computer Science (ENTCS), 145, (167-183), Online publication date: 1-Jan-2006.
  479. Goble C, Gómez-Pérez A, González-Cabero R and Pérez-Hernández M ODEGSG framework, knowledge-based annotation and design of grid services Proceedings of the Third international conference on Service-Oriented Computing, (341-352)
  480. Endo T, Miura J, Nanashima K, Morimoto S, Goto Y and Cheng J Security in persistently reactive systems Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (874-883)
  481. Uhrmacher A and Priami C Discrete event systems specification in systems biology - a discussion of stochastic pi calculus and DEVS Proceedings of the 37th conference on Winter simulation, (317-326)
  482. Fu X, Bultan T and Su J (2005). Synchronizability of Conversations among Web Services, IEEE Transactions on Software Engineering, 31:12, (1042-1055), Online publication date: 1-Dec-2005.
  483. Desai N, Mallya A, Chopra A and Singh M (2005). Interaction Protocols as Design Abstractions for Business Processes, IEEE Transactions on Software Engineering, 31:12, (1015-1027), Online publication date: 1-Dec-2005.
  484. Wang Y, Wu C and Xu K Study on π-calculus based equipment grid service chain model Proceedings of the 2005 IFIP international conference on Network and Parallel Computing, (40-47)
  485. Lam V and Padget J Consistency checking of sequence diagrams and statechart diagrams using the π-calculus Proceedings of the 5th international conference on Integrated Formal Methods, (347-365)
  486. Vigliotti M, Phillips I and Palamidessi C Separation results via leader election problems Proceedings of the 4th international conference on Formal Methods for Components and Objects, (172-194)
  487. Sangiorgi D Beyond bisimulation Proceedings of the 4th international conference on Formal Methods for Components and Objects, (161-171)
  488. da Silva P and de Melo A An ontology for mobile agents in the context of formal verification Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II, (1500-1516)
  489. Zhang L and Yu Z Web process dynamic stepped extension Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I, (202-219)
  490. Holmen H and Nielsen F Language learning in virtual environments Proceedings of the 11th Eurographics conference on Virtual Environments, (141-145)
  491. ACM
    Lumpe M and Schneider J Classboxes Proceedings of the 2005 conference on Specification and verification of component-based systems, (6-es)
  492. ACM
    Ciobanu G and Lucanu D A specification language for coordinated objects Proceedings of the 2005 conference on Specification and verification of component-based systems, (3-es)
  493. Barros A, Dumas M and Oaks P Standards for web service choreography and orchestration Proceedings of the Third international conference on Business Process Management, (61-74)
  494. Barros A, Dumas M and ter Hofstede A Service interaction patterns Proceedings of the 3rd international conference on Business Process Management, (302-318)
  495. Puhlmann F and Weske M Using the π-calculus for formalizing workflow patterns Proceedings of the 3rd international conference on Business Process Management, (153-168)
  496. van der Aalst W, Dumas M, ter Hofstede A, Russell N, Verbeek H and Wohed P Life after BPEL? Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes, (35-50)
  497. Norton B, Foster S and Hughes A A compositional operational semantics for OWL-S Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes, (303-317)
  498. Mazzara M Timing issues in web services composition Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes, (287-302)
  499. Wischik L and Gardner P (2005). Explicit fusions, Theoretical Computer Science, 340:3, (606-630), Online publication date: 31-Aug-2005.
  500. Greenfield P, Kuo D, Nepal S and Fekete A Consistency for web services applications Proceedings of the 31st international conference on Very large data bases, (1199-1203)
  501. Granell C, Gould M, Grønmo R and Skogan D Improving reuse of web service compositions Proceedings of the 6th international conference on E-Commerce and Web Technologies, (358-367)
  502. Danos V and Krivine J Transactions in RCCS CONCUR 2005 - Concurrency Theory, (398-412)
  503. Bhargava M and Palamidessi C Probabilistic anonymity CONCUR 2005 - Concurrency Theory, (171-185)
  504. Gustavsson R and Fredriksson M (2005). Process algebras as support for sustainable systems of services, Applicable Algebra in Engineering, Communication and Computing, 16:2-3, (179-203), Online publication date: 1-Aug-2005.
  505. Viroli M and Omicini A (2005). Process-algebraic approaches for multi-agent systems, Applicable Algebra in Engineering, Communication and Computing, 16:2-3, (69-75), Online publication date: 1-Aug-2005.
  506. Keil D and Goldin D Indirect interaction in environments for multi-agent systems Proceedings of the 2nd international conference on Environments for Multi-Agent Systems, (68-87)
  507. Aldrich J Open modules Proceedings of the 19th European conference on Object-Oriented Programming, (144-168)
  508. Lam V and Padget J Consistency checking of statechart diagrams of a class hierarchy Proceedings of the 19th European conference on Object-Oriented Programming, (412-427)
  509. ACM
    Mandel L and Pouzet M ReactiveML Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming, (82-93)
  510. ACM
    López P, Pfenning F, Polakow J and Watkins K Monadic concurrent linear logic programming Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming, (35-46)
  511. ACM
    d'Amorim M and Havelund K (2005). Event-based runtime verification of java programs, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  512. ACM
    Balasubramaniam D, Morrison R, Kirby G, Mickan K, Warboys B, Robertson I, Snowdon B, Greenwood R and Seet W (2005). A software architecture approach for structuring autonomic systems, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  513. Nielsen C, Andersen E and Nielson H (2005). Static Validation of a Voting Protocol, Electronic Notes in Theoretical Computer Science (ENTCS), 135:1, (115-134), Online publication date: 1-Jul-2005.
  514. Danos V and Tarissan F Self assembling graphs Proceedings of the First international conference on Mechanisms, Symbols, and Models Underlying Cognition: interplay between natural and artificial computation - Volume Part I, (498-507)
  515. Zunino R and Degano P (2005). Weakening the perfect encryption assumption in Dolev-Yao adversaries, Theoretical Computer Science, 340:1, (154-178), Online publication date: 13-Jun-2005.
  516. Bhargavan K, Fournet C and Gordon A (2005). A semantics for web services authentication, Theoretical Computer Science, 340:1, (102-153), Online publication date: 13-Jun-2005.
  517. Warboys B, Greenwood M, Robertson I, Morrison R, Balasubramaniam D, Kirby G and Mickan K The archware tower Proceedings of the 2nd European conference on Software Architecture, (30-40)
  518. Gruhn V and Schäfer C Architecture description for mobile distributed systems Proceedings of the 2nd European conference on Software Architecture, (239-246)
  519. Jeffrey A and Rathke J (2005). A fully abstract may testing semantics for concurrent objects, Theoretical Computer Science, 338:1-3, (17-63), Online publication date: 10-Jun-2005.
  520. ACM
    Hull R and Su J (2005). Tools for composite web services, ACM SIGMOD Record, 34:2, (86-95), Online publication date: 1-Jun-2005.
  521. ACM
    Pucella R (2005). Logical verification and equational verification, ACM SIGACT News, 36:2, (77-88), Online publication date: 1-Jun-2005.
  522. Warboys B Active models Proceedings of the 2005 international conference on Unifying the Software Process Spectrum, (100-107)
  523. Baeten J (2005). A brief history of process algebra, Theoretical Computer Science, 335:2-3, (131-146), Online publication date: 23-May-2005.
  524. Bergstra J and Middleburg C (2005). Process algebra for hybrid systems, Theoretical Computer Science, 335:2-3, (215-280), Online publication date: 23-May-2005.
  525. ACM
    Balasubramaniam D, Morrison R, Kirby G, Mickan K, Warboys B, Robertson I, Snowdon B, Greenwood R and Seet W A software architecture approach for structuring autonomic systems Proceedings of the 2005 workshop on Design and evolution of autonomic application software, (1-7)
  526. ACM
    d'Amorim M and Havelund K Event-based runtime verification of java programs Proceedings of the third international workshop on Dynamic analysis, (1-7)
  527. ACM
    Murthy V and Krishnamurthy E Contextual information management using contract Proceedings of the 2nd conference on Computing frontiers, (236-245)
  528. Datta A, Derek A, Mitchell J and Pavlovic D (2005). A derivation system and compositional logic for security protocols, Journal of Computer Security, 13:3, (423-482), Online publication date: 1-May-2005.
  529. Klin B (2005). From Bialgebraic Semantics to Congruence Formats, Electronic Notes in Theoretical Computer Science (ENTCS), 128:1, (3-37), Online publication date: 1-May-2005.
  530. Grassi V Performance analysis of mobile systems Proceedings of the 5th international conference on Formal Methods for the Design of Computer, Communication, and Software Systems: mobile computing, (107-154)
  531. Oquendo F Model-driven refinement of software architectures with π-ARL Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science, (1-7)
  532. Bocchi L, Ciancarini P and Rossi D Transactional aspects in semantic based discovery of services Proceedings of the 7th international conference on Coordination Models and Languages, (283-297)
  533. Mazzara M and Govoni S A case study of web services orchestration Proceedings of the 7th international conference on Coordination Models and Languages, (1-16)
  534. Bundgaard M, Hildebrandt T and Godskesen J (2005). A CPS Encoding of Name-Passing in Higher-Order Mobile Embedded Resources, Electronic Notes in Theoretical Computer Science (ENTCS), 128:2, (131-150), Online publication date: 14-Apr-2005.
  535. Jeffrey A and Rathke J Java JR Proceedings of the 14th European conference on Programming Languages and Systems, (423-438)
  536. Lumpe M and Schneider J (2005). A form-based meta-model for software composition, Science of Computer Programming, 56:1-2, (59-78), Online publication date: 1-Apr-2005.
  537. ACM
    Guillen-Scholten J, Arbab F, de Boer F and Bonsangue M MoCha-pi, an exogenous coordination calculus based on mobile channels Proceedings of the 2005 ACM symposium on Applied computing, (436-442)
  538. Sassone V and Sobociński P (2005). Locating reaction with 2-categories, Theoretical Computer Science, 333:1-2, (297-327), Online publication date: 1-Mar-2005.
  539. Pattinson D and Wirsing M (2005). A coordination approach to mobile components, Theoretical Computer Science, 331:2-3, (457-483), Online publication date: 25-Feb-2005.
  540. ACM
    Jacobsen C and Jadud M Towards concrete concurrency Proceedings of the 36th SIGCSE technical symposium on Computer science education, (431-435)
  541. ACM
    Jacobsen C and Jadud M (2005). Towards concrete concurrency, ACM SIGCSE Bulletin, 37:1, (431-435), Online publication date: 23-Feb-2005.
  542. Valencia F (2005). Decidability of infinite-state timed CCP processes and first-order LTL, Theoretical Computer Science, 330:3, (577-607), Online publication date: 9-Feb-2005.
  543. Ciobanu G and Lucanu D (2005). Communicating Concurrent Objects in HiddenCCS, Electronic Notes in Theoretical Computer Science (ENTCS), 117:C, (353-373), Online publication date: 20-Jan-2005.
  544. Burckhardt S, Alur R and Martin M Verifying safety of a token coherence implementation by parametric compositional refinement Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation, (130-145)
  545. ACM
    Sumii E and Pierce B (2005). A bisimulation for type abstraction and recursion, ACM SIGPLAN Notices, 40:1, (63-74), Online publication date: 12-Jan-2005.
  546. ACM
    Sumii E and Pierce B A bisimulation for type abstraction and recursion Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (63-74)
  547. Mardare R and Priami C (2005). Logical Analysis of Biological Systems, Fundamenta Informaticae, 64:1-4, (275-289), Online publication date: 1-Jan-2005.
  548. Maydl W and Grunske L Behavioral types for embedded software Component-Based Software Development for Embedded Systems, (82-106)
  549. Georgantas N, Mokhtar S, Tartanoglu F and Issarny V Semantics-aware services for the mobile computing environment Architecting Dependable Systems III, (1-35)
  550. Uhrmacher A, Degenring D and Zeigler B Discrete event multi-level models for systems biology Transactions on Computational Systems Biology I, (66-89)
  551. Priami C and Quaglia P Operational patterns in beta-binders Transactions on Computational Systems Biology I, (50-65)
  552. Cardelli L Abstract machines of systems biology Transactions on Computational Systems Biology III, (145-168)
  553. Ciocchetta F, Priami C and Quaglia P Modeling kohn interaction maps with beta-binders Transactions on Computational Systems Biology III, (33-48)
  554. Ribeiro L, Dotti F and Bardohl R A formal framework for the development of concurrent object-based systems Formal Methods in Software and Systems Modeling, (385-401)
  555. Pankratius V and Stucky W A formal foundation for workflow composition, workflow view definition, and workflow normalization based on petri nets Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43, (79-88)
  556. Compton M Stenning's protocol implemented in UDP and verified in Isabelle Proceedings of the 2005 Australasian symposium on Theory of computing - Volume 41, (21-30)
  557. Bistarelli S, Cervesato I, Lenzini G and Martinelli F (2005). Relating multiset rewriting and process algebras for security protocol analysis, Journal of Computer Security, 13:1, (3-47), Online publication date: 1-Jan-2005.
  558. ACM
    Abadi M and Blanchet B (2005). Analyzing security protocols with secrecy types and logic programs, Journal of the ACM, 52:1, (102-146), Online publication date: 1-Jan-2005.
  559. Glesner S and Blech J Coalgebraic semantics for component systems Proceedings of the 2004 international conference on Architecting Systems with Trustworthy Components, (245-261)
  560. Viroli M (2004). Towards a Formal Foundation to Orchestration Languages, Electronic Notes in Theoretical Computer Science (ENTCS), 105:C, (51-71), Online publication date: 10-Dec-2004.
  561. Bocchi L and Wischik L (2004). A Process Calculus of Atomic Commit, Electronic Notes in Theoretical Computer Science (ENTCS), 105:C, (119-132), Online publication date: 10-Dec-2004.
  562. Gupta R and Shyamasundar R Reactive framework for resource aware distributed computing Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, (452-467)
  563. Fu X, Bultan T and Su J (2004). Conversation protocols, Theoretical Computer Science, 328:1-2, (19-37), Online publication date: 29-Nov-2004.
  564. ACM
    Nakamura M, Igaki H, Tamada H and Matsumoto K Implementing integrated services of networked home appliances using service oriented architecture Proceedings of the 2nd international conference on Service oriented computing, (269-278)
  565. ACM
    Gerede Ç, Hull R, Ibarra O and Su J Automated composition of e-services Proceedings of the 2nd international conference on Service oriented computing, (252-262)
  566. Ball T A theory of predicate-complete test coverage and generation Proceedings of the Third international conference on Formal Methods for Components and Objects, (1-22)
  567. ACM
    Balasubramaniam D, Morrison R, Mickan K, Kirby G, Warboys B, Robertson I, Snowdon B, Greenwood R and Seet W Support for feedback and change in self-adaptive systems Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems, (18-22)
  568. Rajamani S and Rehof J Models for contract conformance Proceedings of the First international conference on Leveraging Applications of Formal Methods, (181-196)
  569. ACM
    Bhargavan K, Corin R, Fournet C and Gordon A Secure sessions for web services Proceedings of the 2004 workshop on Secure web service, (56-66)
  570. Platon E, Sabouret N and Honiden S T-compound interaction and overhearing agents Proceedings of the 5th international conference on Engineering Societies in the Agents World, (90-105)
  571. ACM
    Grassi V, Mirandola R and Sabetta A UML based modeling and performance analysis of mobile systems Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, (95-104)
  572. Curti M, Degano P, Priami C and Baldari C (2004). Modelling biochemical pathways through enhanced π-calculus, Theoretical Computer Science, 325:1, (111-140), Online publication date: 28-Sep-2004.
  573. Regev A, Panina E, Silverman W, Cardelli L and Shapiro E (2004). BioAmbients, Theoretical Computer Science, 325:1, (141-167), Online publication date: 28-Sep-2004.
  574. ACM
    Colaço J, Girault A, Hamon G and Pouzet M Towards a higher-order synchronous data-flow language Proceedings of the 4th ACM international conference on Embedded software, (230-239)
  575. Schäfer A A calculus for shapes in time and space Proceedings of the First international conference on Theoretical Aspects of Computing, (463-477)
  576. Jeffrey A and Rathke J (2004). A theory of bisimulation for a fragment of concurrent ML with local names, Theoretical Computer Science, 323:1-3, (1-48), Online publication date: 14-Sep-2004.
  577. ACM
    Oquendo F (2004). Formally refining software architectures with π-ARL, ACM SIGSOFT Software Engineering Notes, 29:5, (1-26), Online publication date: 1-Sep-2004.
  578. ACM
    Oquendo F (2004). π-ARL, ACM SIGSOFT Software Engineering Notes, 29:5, (1-20), Online publication date: 1-Sep-2004.
  579. Gnesi S, Lenzini G and Martinelli F (2004). Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability, Electronic Notes in Theoretical Computer Science (ENTCS), 99, (111-126), Online publication date: 1-Aug-2004.
  580. Chopra A and Singh M Commitments for Flexible Business Processes Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3, (1362-1363)
  581. Jifeng H Linking theories of concurrency Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years, (61-74)
  582. Mardare R and Priami C (2004). Logical Analysis of Biological Systems, Fundamenta Informaticae, 64:1-4, (275-289), Online publication date: 1-Jul-2004.
  583. Murakami M (2004). A model of runtime transformation for distributed systems based on directed acyclic graph model, Journal of Systems Architecture: the EUROMICRO Journal, 50:7, (417-425), Online publication date: 1-Jul-2004.
  584. ACM
    Hull R and Su J Tools for design of composite Web services Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (958-961)
  585. Welch P Through the concurrency gateway Proceedings of the 5th Eurographics conference on Parallel Graphics and Visualization, (17-22)
  586. ACM
    Petride S (2004). Review of "Concurrent and real-time systems, ACM SIGACT News, 35:2, (4-12), Online publication date: 1-Jun-2004.
  587. Chaki S, Clarke E, Groce A, Jha S and Veith H (2004). Modular Verification of Software Components in C, IEEE Transactions on Software Engineering, 30:6, (388-402), Online publication date: 1-Jun-2004.
  588. Mascolo C, Picco G and Roman G (2004). CODEWEAVE, Automated Software Engineering, 11:3, (207-243), Online publication date: 1-Jun-2004.
  589. Nygaard M and Winskel G (2004). Domain theory for concurrency, Theoretical Computer Science, 316:1-3, (153-190), Online publication date: 28-May-2004.
  590. Priami C and Quaglia P Beta binders for biological interactions Proceedings of the 20 international conference on Computational Methods in Systems Biology, (20-33)
  591. Cardelli L Brane calculi Proceedings of the 20 international conference on Computational Methods in Systems Biology, (257-278)
  592. Chiarugi D, Curti M, Degano P and Marangoni R VICE Proceedings of the 20 international conference on Computational Methods in Systems Biology, (207-220)
  593. Gordon A and Jeffrey A (2004). Types and effects for asymmetric cryptographic protocols, Journal of Computer Security, 12:3,4, (435-483), Online publication date: 1-May-2004.
  594. ACM
    Oquendo F (2004). π-ADL, ACM SIGSOFT Software Engineering Notes, 29:3, (1-14), Online publication date: 1-May-2004.
  595. ACM
    Pulimood S and Belkhouche B A Mobile Computational model for Internet programming Proceedings of the 42nd annual Southeast regional conference, (347-352)
  596. Masuyama T, Peschanski F, Oyama Y and Yonezawa A MobileScope Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7, (542-547)
  597. ACM
    Lecca P, Priami C, Laudanna C and Constantin G Predicting cell adhesion probability via the biochemical stochastic π-calculus Proceedings of the 2004 ACM symposium on Applied computing, (211-212)
  598. Schmitt A and Stefani J The Kell Calculus IST/FET International Workshop on Global Computing - Volume 3267, (146-178)
  599. Pokozy-Korenblat K, Priami C and Quaglia P Performance Analysis of a UML Micro-business Case Study IST/FET International Workshop on Global Computing - Volume 3267, (107-126)
  600. ACM
    Bhargavan K, Fournet C and Gordon A A semantics for web services authentication Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (198-209)
  601. Smith G A formal framework for modelling and analysing mobile systems Proceedings of the 27th Australasian conference on Computer science - Volume 26, (193-202)
  602. ACM
    Bhargavan K, Fournet C and Gordon A (2004). A semantics for web services authentication, ACM SIGPLAN Notices, 39:1, (198-209), Online publication date: 1-Jan-2004.
  603. McColm G (2004). Guarded Quantification in Least Fixed Point Logic, Journal of Logic, Language and Information, 13:1, (61-110), Online publication date: 1-Jan-2004.
  604. Caires L and Cardelli L (2003). A spatial logic for concurrency (part I), Information and Computation, 186:2, (194-235), Online publication date: 1-Nov-2003.
  605. van der Aalst W, van Dongen B, Herbst J, Maruster L, Schimm G and Weijters A (2003). Workflow mining, Data & Knowledge Engineering, 47:2, (237-267), Online publication date: 1-Nov-2003.
  606. ACM
    Datta A, Derek A, Mitchell J and Pavlovic D Secure protocol composition Proceedings of the 2003 ACM workshop on Formal methods in security engineering, (11-23)
  607. ACM
    Newman R and Gaura E Formal design of SMIL presentations Proceedings of the 21st annual international conference on Documentation, (113-116)
  608. Gilmore S, Hillston J, Kloul L and Ribaudo M (2003). PEPA nets, Performance Evaluation, 54:2, (79-104), Online publication date: 1-Oct-2003.
  609. Fu X, Bultan T and Su J Conversation protocols Proceedings of the 8th international conference on Implementation and application of automata, (188-200)
  610. Wang L and Chen K A typed theory for access control and information flow control in mobile systems Proceedings of the 8th Australasian conference on Information security and privacy, (154-165)
  611. Durgin N, Mitchell J and Pavlovic D (2003). A compositional logic for proving security properties of protocols, Journal of Computer Security, 11:4, (677-721), Online publication date: 1-Jul-2003.
  612. Gordon A and Jeffrey A (2003). Authenticity by typing for security protocols, Journal of Computer Security, 11:4, (451-519), Online publication date: 1-Jul-2003.
  613. Curbera F, Khalaf R, Leymann F and Weerawarana S Exception handling in the BPEL4WS language Proceedings of the 2003 international conference on Business process management, (276-290)
  614. Al-Shabibi A, Buchs D, Buffo M, Chachkov S, Chen A and Hurzeler D Prototyping object oriented specifications Proceedings of the 24th international conference on Applications and theory of Petri nets, (473-482)
  615. Murakami M (2003). Evolvable concurrent processes, Computer Standards & Interfaces, 25:3, (233-239), Online publication date: 1-Jun-2003.
  616. Zakiuddin I, Goldsmith M, Whittaker P and Gardiner P A methodology for model-checking ad-hoc networks Proceedings of the 10th international conference on Model checking software, (181-196)
  617. Gordon A and Jeffrey A (2003). Typing correspondence assertions for communication protocols, Theoretical Computer Science, 300:1-3, (379-409), Online publication date: 7-May-2003.
  618. Chaki S, Clarke E, Groce A, Jha S and Veith H Modular verification of software components in C Proceedings of the 25th International Conference on Software Engineering, (385-395)
  619. Hoare T The verifying compiler Proceedings of the 12th international conference on Compiler construction, (262-272)
  620. Pahl C An ontology for software component matching Proceedings of the 6th international conference on Fundamental approaches to software engineering, (6-21)
  621. Cardelli L, Gardner P and Ghelli G Manipulating trees with hidden labels Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software, (216-230)
  622. Rounds W and Song H The φ-calculus Proceedings of the 6th international conference on Hybrid systems: computation and control, (435-449)
  623. Hoare C (2003). Assertions, IEEE Annals of the History of Computing, 25:2, (14-25), Online publication date: 1-Apr-2003.
  624. ACM
    Kobayashi N (2003). Time regions and effects for resource usage analysis, ACM SIGPLAN Notices, 38:3, (50-61), Online publication date: 18-Mar-2003.
  625. Van Belle W, Mens T and D'Hondt T Using genetic programming to generate protocol adaptors for interprocess communication Proceedings of the 5th international conference on Evolvable systems: from biology to hardware, (422-433)
  626. ACM
    Pucella R (2003). Review of the π-calculus, ACM SIGACT News, 34:1, (17-24), Online publication date: 1-Mar-2003.
  627. ACM
    Kobayashi N Time regions and effects for resource usage analysis Proceedings of the 2003 ACM SIGPLAN international workshop on Types in languages design and implementation, (50-61)
  628. ACM
    Jensen O and Milner R (2003). Bigraphs and transitions, ACM SIGPLAN Notices, 38:1, (38-49), Online publication date: 15-Jan-2003.
  629. ACM
    Jensen O and Milner R Bigraphs and transitions Proceedings of the 30th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (38-49)
  630. Smith S and Talcott C (2002). Specification Diagrams for Actor Systems, Higher-Order and Symbolic Computation, 15:4, (301-348), Online publication date: 1-Dec-2002.
  631. ACM
    Gordon A and Pucella R Validating a Web service security abstraction by typing Proceedings of the 2002 ACM workshop on XML security, (18-29)
  632. Ciobanu G and Rotaru M (2002). Molecular interaction, Theoretical Computer Science, 289:1, (801-827), Online publication date: 23-Oct-2002.
  633. ACM
    Nielsen M, Palamidessi C and Valencia F On the expressive power of temporal concurrent constraint programming languages Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming, (156-167)
  634. ACM
    Ostrovsky K, Prasad K and Taha W Towards a primitive higher order calculus of broadcasting systems Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming, (2-13)
  635. Shafto M and Hoffman R (2002). Guest Editors' Introduction, IEEE Intelligent Systems, 17:5, (10-13), Online publication date: 1-Sep-2002.
  636. ACM
    Viroli M and Omicini A Specifying agent observable behaviour Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2, (712-720)
  637. Gordon A and Jeffrey A Types and Effects for Asymmetric Cryptographic Protocols Proceedings of the 15th IEEE workshop on Computer Security Foundations
  638. Chaumette S and Grange P Parallelizing Multithreaded Java Program Proceedings of the 16th International Parallel and Distributed Processing Symposium
  639. ACM
    Chaki S, Rajamani S and Rehof J Types as models Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (45-57)
  640. ACM
    Abadi M and Blanchet B Analyzing security protocols with secrecy types and logic programs Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (33-44)
  641. Nielsen M and Valencia F Temporal concurrent constraint programming Formal and natural computing, (298-321)
  642. Lee J and Zic J (2002). On modeling real-time mobile processes, Australian Computer Science Communications, 24:1, (139-147), Online publication date: 1-Jan-2002.
  643. Lee J and Zic J On modeling real-time mobile processes Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4, (139-147)
  644. ACM
    Chaki S, Rajamani S and Rehof J (2002). Types as models, ACM SIGPLAN Notices, 37:1, (45-57), Online publication date: 1-Jan-2002.
  645. ACM
    Abadi M and Blanchet B (2002). Analyzing security protocols with secrecy types and logic programs, ACM SIGPLAN Notices, 37:1, (33-44), Online publication date: 1-Jan-2002.
  646. Kindberg T and Fox A (2002). System Software for Ubiquitous Computing, IEEE Pervasive Computing, 1:1, (70-81), Online publication date: 1-Jan-2002.
  647. ACM
    Crazzolara F and Winskel G Events in security protocols Proceedings of the 8th ACM conference on Computer and Communications Security, (96-105)
  648. ACM
    Russell G (2001). Events in Haskell, and how to implement them, ACM SIGPLAN Notices, 36:10, (157-168), Online publication date: 1-Oct-2001.
  649. ACM
    Russell G Events in Haskell, and how to implement them Proceedings of the sixth ACM SIGPLAN international conference on Functional programming, (157-168)
  650. Nottegar C, Priami C and Degano P (2001). Performance Evaluation of Mobile Processes via Abstract Machines, IEEE Transactions on Software Engineering, 27:10, (867-889), Online publication date: 1-Oct-2001.
  651. ACM
    Kaveh N and Emmerich W Deadlock detection in distribution object systems Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (44-51)
  652. ACM
    Kaveh N and Emmerich W (2001). Deadlock detection in distribution object systems, ACM SIGSOFT Software Engineering Notes, 26:5, (44-51), Online publication date: 1-Sep-2001.
  653. Sewell P π-calculi Formal methods for distributed processing, (177-197)
  654. Agha G, Thati P and Ziaei R Actors Formal methods for distributed processing, (155-176)
  655. Ankolekar A, Burstein M, Hobbs J, Lassila O, Martin D, McIlraith S, Narayanan S, Paolucci M, Payne T, Sycara K and Zeng H DAML-S Proceedings of the First International Conference on Semantic Web Working, (411-430)
  656. Kaveh N Model checking distributed objects design Proceedings of the 23rd International Conference on Software Engineering, (793-794)
  657. Durgin N, Mitchell J and Pavlovic D A Compositional Logic for Protocol Correctness Proceedings of the 14th IEEE workshop on Computer Security Foundations
  658. Gordon A and Jeffrey A Authenticity by Typing for Security Protocols Proceedings of the 14th IEEE workshop on Computer Security Foundations
  659. Cardelli L and Gordon A Logical properties of name restriction Proceedings of the 5th international conference on Typed lambda calculi and applications, (46-60)
  660. ACM
    Pucella R (2001). Review of proof, language, and interaction, ACM SIGACT News, 32:1, (12-16), Online publication date: 1-Mar-2001.
  661. ACM
    Abadi M and Fournet C (2001). Mobile values, new names, and secure communication, ACM SIGPLAN Notices, 36:3, (104-115), Online publication date: 1-Mar-2001.
  662. Zilio S Mobile processes Modeling and verification of parallel processes, (206-222)
  663. ACM
    Abadi M and Fournet C Mobile values, new names, and secure communication Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (104-115)
  664. Jeffrey A and Rathke J A Theory of Bisimulation for a Fragment of Concurrent ML with Local Names Proceedings of the 15th Annual IEEE Symposium on Logic in Computer Science
  665. ACM
    Roman G, Picco G and Murphy A Software engineering for mobility Proceedings of the Conference on The Future of Software Engineering, (241-258)
  666. Giese H, Vogel T and Wätzoldt S Towards Smart Systems of Systems Fundamentals of Software Engineering, (1-29)
Contributors
  • University of Cambridge

Recommendations