Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    New York, NY [u.a.] : Cambridge University Press
    UID:
    b3kat_BV014640097
    Format: X, 529 S. , graph. Darst.
    Edition: 1. publ.
    ISBN: 0521780985
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Programmiersprache
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    Cambridge, Mass. [u.a.] : MIT Press
    UID:
    b3kat_BV011013693
    Format: XIX, 846 S. , graph. Darst.
    ISBN: 0262133210
    Series Statement: Foundations of computing
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Programmiersprache ; Typisierter Lambda-Kalkül ; Duval, André 1929-1998
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1649306016
    Format: Online-Ressource
    ISBN: 9783540483830
    Series Statement: Lecture Notes in Computer Science 789
    Additional Edition: ISBN 9783540578871
    Additional Edition: Buchausg. u.d.T. Theoretical aspects of computer software Berlin : Springer, 1994 ISBN 3540578870
    Additional Edition: ISBN 0387578870
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Software ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_879673117
    Content: Includes bibliography
    In: Proceedings of the Workshop on Issues in the Privatization of Water Utilities in the Americas: contributions - LC/R.1722/Add.1 - 1997 - p. 68-74
    Language: English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    Cambridge (UK) [u.a.] : Cambridge Univ. Press
    UID:
    b3kat_BV024620460
    Format: X, 529 S. , Ill., graph. Darst.
    Edition: Reprint.
    ISBN: 9780521780988 , 0521780985
    Note: Nachdr. der 1. Aufl., 2003
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Programmiersprache
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Pittsburgh, Pa. : School of Computer Science, Carnegie Mellon Univ.
    UID:
    b3kat_BV026100858
    Format: 39 S.
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_737551119
    Format: Online-Ressource (XX, 286 S.)
    Edition: 2013 Springer eBook collection. Computer science
    ISBN: 9783642368301
    Series Statement: Lecture notes in computer science 7796
    Content: This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems
    Note: Literaturangaben , Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks -- Practical Everlasting Privacy -- A Differentially Private Mechanism of Optimal Utility for a Region of Priors -- Proved Generation of Implementations from Computationally Secure Protocol Specifications -- Sound Security Protocol Transformations -- Logical Foundations of Secure Resource Management in Protocol Implementations -- Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage -- Lazy Mobile Intruders -- On Layout Randomization for Arrays and Functions -- A Theory of Agreements and Protection -- Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification -- Proving More Observational Equivalences with ProVerif -- Formal Verification of e-Auction Protocols -- Sessions and Separability in Security Protocols.
    Additional Edition: ISBN 3642368298
    Additional Edition: ISBN 9783642368295
    Additional Edition: Druckausg. Principles of security and trust Berlin : Springer, 2013 ISBN 3642368298
    Additional Edition: ISBN 9783642368295
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Trusted Computing ; Privatsphäre ; Sicherheitsprotokoll ; Kryptoanalyse ; Kryptosystem ; Verifikation ; Formale Methode ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cambridge : Cambridge University Press
    UID:
    gbv_883408074
    Format: 1 Online-Ressource (x, 529 pages) , digital, PDF file(s)
    ISBN: 9780511804175
    Content: For undergraduate and beginning graduate students, this textbook explains and examines the central concepts used in modern programming languages, such as functions, types, memory management, and control. The book is unique in its comprehensive presentation and comparison of major object-oriented programming languages. Separate chapters examine the history of objects, Simula and Smalltalk, and the prominent languages C++ and Java. The author presents foundational topics, such as lambda calculus and denotational semantics, in an easy-to-read, informal style, focusing on the main insights provided by these theories. Advanced topics include concurrency, concurrent object-oriented programming, program components, and inter-language interoperability. A chapter on logic programming illustrates the importance of specialized programming methods for certain kinds of problems. This book will give the reader a better understanding of the issues and tradeoffs that arise in programming language design, and a better appreciation of the advantages and pitfalls of the programming languages they use
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015)
    Additional Edition: ISBN 9780521780988
    Additional Edition: Print version ISBN 9780521780988
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Cambridge, Mass. [u.a.] : MIT Press
    UID:
    b3kat_BV026522311
    Format: XIX, 846 S. , graph. Darst.
    Edition: 2. print
    ISBN: 0262133210
    Series Statement: Foundations of computing
    Note: Literaturverz. S. [817] - 836
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Duval, André 1929-1998 ; Programmiersprache ; Typisierter Lambda-Kalkül
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_177387845X
    Format: 1 Online-Ressource(XIV, 676 p.)
    Edition: 1st ed. 2004.
    ISBN: 9781402081415
    Series Statement: IFIP Advances in Information and Communication Technology 155
    Content: Invited talks -- The tPI (tRNA Pairing Index) a Mathematical Measure of Repetition in a (Biological) Sequence -- Stability of Approximation in Discrete Optimization -- Towards a Broader Theory of Mobile Processes -- A Decidable Analysis of Security Protocols -- Track (1) on Algorithms, Complexity, and Models of Computation -- Looking Inside A?s and B?s -- Remove key Escrow from the Identity-Based Encryption System -- A Randomised Algorithm for Checking The Normality of Cryptographic Boolean Functions -- Reversible Circuit Realizations of Boolean Functions -- Resource Bounded Immunity and Simplicity -- Degree Bounds on Polynomials and Relativization Theory -- The Firing Squad Synchronization Problem with Many Generals for One-Dimensional CA -- A Matrix Q-Analogue of the Parikh Map -- The Inherent Queuing Delay of Parallel Packet Switches -- Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Tree -- Truthful Mechanisms for Generalized Utilitarian Problems -- The Driving Philosophers -- Engineering an External Memory Minimum Spanning Tree Algorithm -- Scheduling With Release Times and Deadlines on A Minimum Number of Machines -- Approximation Algorithms for Mixed Fractional Packing and Covering Problems -- On Weighted Rectangle Packing with Large Resources -- An O(n log2 n) Algorithm for a Sink Location Problem in Dynamic Tree Networks -- Efficient Algorithms for Handling Molecular Weighted Sequences -- Imperfectness of Data for STS-Based Physical Mapping -- Solving Packing Problem with Weaker Block Solvers -- Adaptive Sorting with AVL Trees -- Precise Analysis of ?-calculus in Cubic Time -- Track (2) on Logic, Semantics, Specification, and Verification -- Prototyping Proof Carrying Code -- Contract Oriented Development of Component Software -- New Insights on Architectural Connectors -- On Complexity of Model-Checking for the TQL Logic -- A Generic Framework for Checking Semantic Equivalences Between Pushdown Automata and Finite-State Automata -- Tailoring Recursion to Characterize Non-Deterministic Complexity Classes Over Arbitrary Structures -- A Calculus with Lazy Module Operators -- Dynamic Typing with Dependent Types -- Subtyping-Inheritance Conflicts: The Mobile Mixin Case -- Asymptotic Behaviors of Type-2 Algorithms and Induced Baire Topologies -- Effective Chemistry for Synchrony and Asynchrony -- Controller Synthesis for Probabilistic Systems (Extended Abstract) -- Highly Undecidable Questions for Process Algebras -- New-HOPLA a higher-order process language with name generation -- Behavioural Equivalences for Dynamic Web Data -- Behavioural Theory for Mobile Ambients -- Nested Commits For Mobile Calculi: Extending Join -- Dynamic and Local Typing for Mobile Ambients -- Polya:True Type Polymorphism for Mobile Ambients -- Recovering Resources in the ?-Calculus (DRAFT) -- Ensuring Termination by Typability -- The Simply-Typed Pure Pattern Type System Ensures Strong Normalization -- Termination in Modal Kleene Algebra -- Regular Tree Language Recognition with Static Information.
    Content: Exploring New Frontiers of Theoretical Informatics Edited by Jean-Jacques Levy, Ernst W. Mayr, and John C. Mitchell In recent years, IT application scenarios have evolved in very innovative ways. Highly distributed networks have now become a common platform for large-scale distributed programming, high bandwidth communications are inexpensive and widespread, and most of our work tools are equipped with processors enabling us to perform a multitude of tasks. In addition, mobile computing (referring specifically to wireless devices and, more broadly, to dynamically configured systems) has made it possible to exploit interaction in novel ways. To harness the flexibility and power of these rapidly evolving, interactive systems, there is need of radically new foundational ideas and principles; there is need to develop the theoretical foundations required to design these systems and to cope with the many complex issues involved in their construction; and there is need to develop effective principles for building and analyzing such systems. Reflecting the diverse and wide spectrum of topics and interests within the theoretical computer science community, Exploring New Frontiers of Theoretical Informatics is presented in two distinct but interrelated tracks: -Algorithms, Complexity and Models of Computation, -Logic, Semantics, Specification and Verification. Exploring New Frontiers of Theoretical Informatics contains 46 original and significant contributions addressing these foundational questions, as well as four papers by outstanding invited speakers. These papers were presented at the 3rd IFIP International Conference on Theoretical Computer Science (TCS 2004), which was held in conjunction with the 18th World Computer Congress in Toulouse, France in August 2004 and sponsored by the International Federation for Information Processing (IFIP).
    Note: Includes bibliographical references and index , ""CONTENTS""; ""Preface""; ""Program Committee""; ""Invited talks""; ""The tPI (tRNA Pairing Index), a Mathematical Measure of Repetition in a (Biological) Sequence""; ""Stability of Approximation in Discrete Optimization""; ""Towards a Broader Theory of Mobile Processes""; ""A Decidable Analysis of Security Protocols""; ""Track (1) on Algorithms, Complexity, and Models of Computation""; ""Looking Inside AES and BES""; ""Remove Key Escrow from The Identity-Based Encryption System""; ""A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions"" , ""Reversible Circuit Realizations of Boolean Functions""""Resource Bounded Immunity and Simplicity""; ""Degree Bounds on Polynomials and Relativization Theory""; ""The Firing Squad Synchronization Problem with Many Generals For One-Dimensional CA""; ""A Matrix q-Analogue of the Parikh Map""; ""The Inherent Queuing Delay of Parallel Packet Switches""; ""Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Tree""; ""Truthful Mechanisms for Generalized Utilitarian Problems""; ""The Driving Philosophers""; ""Engineering an External Memory Minimum Spanning Tree Algorithm"" , ""Scheduling with Release Times and Deadlines on a Minimum Number of Machines""""Approximation Algorithms for Mixed Fractional Packing and Covering Problems""; ""On Weighted Rectangle Packing with Large Resources""; ""An O(nlog[sup(2)]n) Algorithm for the Optimal Sink Location Problem in Dynamic Tree Networks""; ""Efficient Algorithms for Handling Molecular Weighted Sequences""; ""Imperfectness of Data for STS-Based Physical Mapping""; ""Solving Packing Problem with Weaker Block Solvers""; ""Adaptive Sorting with AVL Trees""; ""Precise Analysis of π-Calculus in Cubic Time"" , ""Track (2) on Logic, Semantics, Specification, and Verification""""Prototyping Proof Carrying Code""; ""Contract Oriented Development of Component Software""; ""New Insights on Architectural Connectors""; ""On Complexity of Model-Checking for the TQL Logic""; ""A Generic Framework for Checking Semantic Equivalences between Pushdown Automata and Finite-State Automata""; ""Tailoring Recursion to Characterize Non-Deterministic Complexity Classes over Arbitrary Structures""; ""A Calculus with Lazy Module Operators""; ""Dynamic Typing with Dependent Types"" , ""Subtyping-Inheritance Conflicts: The Mobile Mixin Case""""Asymptotic Behaviors of Type-2 Algorithms and Induced Baire Topologies""; ""Effective Chemistry for Synchrony and Asynchrony""; ""Controller Synthesis for Probabilistic Systems""; ""Highly Undecidable Questions for Process Algebras""; ""New-HOPLA: A Higher-order Process Language with Name Generation""; ""Behavioural Equivalences for Dynamic Web Data""; ""Behavioural Theory for Mobile Ambients""; ""Nested Commits for Mobile Calculi: Extending Join""; ""Dynamic and Local Typing for Mobile Ambients"" , ""PolyA: True Type Polymorphism for Mobile Ambients""
    Additional Edition: ISBN 9781441954862
    Additional Edition: ISBN 9781402081408
    Additional Edition: ISBN 9781475780215
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781441954862
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781402081408
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475780215
    Language: English
    Keywords: Theoretische Informatik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages