-
DISPONIBILITÀ IMMEDIATA
{{/disponibilitaBox}}
-
{{speseGratisLibroBox}}
{{/noEbook}}
{{^noEbook}}
-
Libro
-
Transactions on Petri Nets and Other Models of Concurrency X
koutny maciej (curatore); desel jörg (curatore); haddad serge (curatore)
54,98 €
52,23 €
{{{disponibilita}}}
TRAMA
These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed. This Journal has its own Editorial Board which selects papers based on a rigorous two-stage refereeing process. ToPNoC contains:- Revised versions of a selection of the best papers from workshops and tutorials at the annual Petri net conferences- Special sections/issues within particular subareas (similar to those published in the Advances in Petri Nets series)- Other papers invited for publication in ToPNoC- Papers submitted directly to ToPNoC by their authorsThe 10th volume of ToPNoC contains revised and extended versions of a selection of the best workshop papers presented at the 35th International Conference on Application and Theory of Petri Nets and Concurrency, Petri Nets 2014, and the 14th International Conference on Application of Concurrency to System Design, ACSD 2014. It also contains one paper submitted directly to ToPNoC.The 8 papers cover a diverse range of topics including model checking and system verification, refinement, and synthesis; foundational work on specific classes of Petri nets; and innovative applications of Petri nets and other models of concurrency.SOMMARIO
Verification of Logs - Revealing Faulty Processes of a Medical Laboratory.- An Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage Model.- Timed Aggregate Graph: Finite Graph Preserving Event- and State-Based Quantitative Properties of Time Petri Nets.- SMT-based Abstract Parametric Temporal Planning.- Kleene Theorems for Synchronous Products with Matching.- Symbolic Model Checking of Security Protocols for Ad Hoc Networks on Any Topologies.- Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling.- Modelling and Analysis Mobile Systems Using p-Calculus (EFCP).ALTRE INFORMAZIONI
- Condizione: Nuovo
- ISBN: 9783662486498
- Collana: Lecture Notes in Computer Science
- Dimensioni: 235 x 155 mm
- Formato: Brossura
- Illustration Notes: XV, 177 p. 41 illus. in color.
- Pagine Arabe: 177
- Pagine Romane: xv