Advances in Computing Science - ASIAN'99


Book Description

This book constitutes the refereed proceedings of the 5th Asian Computing Science Conference, ASIAN'99, held in Phuket, Thailand, in December 1999. The 28 revised full papers presented together with two invited contributions and 11 short presentations were carefully reviewed and selected from a total of 114 submissions. Among the topics addressed are programming theory, formal methods, automated reasoning, verification, embedded systems, real-time systems, distributed systems, and mobile computing.




Advances in Computing Science - ASIAN 2003, Programming Languages and Distributed Computation


Book Description

This book constitutes the refereed proceedings of the 8th Asian Computing Science Conference, ASIAN 2003, held in Mumbai, India in December 2003. The 16 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 53 submissions. Among the topics addressed are type theory for operating systems protection, self configurable servers, network services, predicate detection, hierarchical specification, proof theory, electronic auctions, secure mobile computing, programming casculi, access control, middleware, program logic, real-time systems, and probabilistic distributed systems.




CONCUR 2002 - Concurrency Theory


Book Description

This book constitutes the refereed proceedings of the 13th International Conference on Concurrency Theory, CONCUR 2002, held in Brno, Czech Republic in August 2002.The 32 revised full papers presented together with abstracts of seven invited contributions were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on verification and model checking, logic, mobility, probabilistic systems, models of computation and process algebra, security, Petri nets, and bisimulation.




Lectures on the Curry-Howard Isomorphism


Book Description

The Curry-Howard isomorphism states an amazing correspondence between systems of formal logic as encountered in proof theory and computational calculi as found in type theory. For instance,minimal propositional logic corresponds to simply typed lambda-calculus, first-order logic corresponds to dependent types, second-order logic corresponds to polymorphic types, sequent calculus is related to explicit substitution, etc.The isomorphism has many aspects, even at the syntactic level:formulas correspond to types, proofs correspond to terms, provability corresponds to inhabitation, proof normalization corresponds to term reduction, etc.But there is more to the isomorphism than this. For instance, it is an old idea---due to Brouwer, Kolmogorov, and Heyting---that a constructive proof of an implication is a procedure that transformsproofs of the antecedent into proofs of the succedent; the Curry-Howard isomorphism gives syntactic representations of such procedures. The Curry-Howard isomorphism also provides theoretical foundations for many modern proof-assistant systems (e.g. Coq).This book give an introduction to parts of proof theory and related aspects of type theory relevant for the Curry-Howard isomorphism. It can serve as an introduction to any or both of typed lambda-calculus and intuitionistic logic.Key features- The Curry-Howard Isomorphism treated as common theme- Reader-friendly introduction to two complementary subjects: Lambda-calculus and constructive logics- Thorough study of the connection between calculi and logics- Elaborate study of classical logics and control operators- Account of dialogue games for classical and intuitionistic logic- Theoretical foundations of computer-assisted reasoning· The Curry-Howard Isomorphism treated as the common theme.· Reader-friendly introduction to two complementary subjects: lambda-calculus and constructive logics · Thorough study of the connection between calculi and logics.· Elaborate study of classical logics and control operators.· Account of dialogue games for classical and intuitionistic logic.· Theoretical foundations of computer-assisted reasoning




Mechanizing Hypothesis Formation


Book Description

Mechanizing hypothesis formation is an approach to exploratory data analysis. Its development started in the 1960s inspired by the question “can computers formulate and verify scientific hypotheses?”. The development resulted in a general theory of logic of discovery. It comprises theoretical calculi dealing with theoretical statements as well as observational calculi dealing with observational statements concerning finite results of observation. Both calculi are related through statistical hypotheses tests. A GUHA method is a tool of the logic of discovery. It uses a one-to-one relation between theoretical and observational statements to get all interesting theoretical statements. A GUHA procedure generates all interesting observational statements and verifies them in a given observational data. Output of the procedure consists of all observational statements true in the given data. Several GUHA procedures dealing with association rules, couples of association rules, action rules, histograms, couples of histograms, and patterns based on general contingency tables are involved in the LISp-Miner system developed at the Prague University of Economics and Business. Various results about observational calculi were achieved and applied together with the LISp-Miner system. The book covers a brief overview of logic of discovery. Many examples of applications of the GUHA procedures to solve real problems relevant to data mining and business intelligence are presented. An overview of recent research results relevant to dealing with domain knowledge in data mining and its automation is provided. Firsthand experiences with implementation of the GUHA method in the Python language are presented.




Advances in Computing Science – ASIAN 2002: Internet Computing and Modeling, Grid Computing, Peer-to-Peer Computing, and Cluster Computing


Book Description

This book constitutes the refereed proceedings of the 7th Asian Computing Science Conference, ASIAN 2002, held in Hanoi, Vietnam in December 2002. The 17 revised full papers presented together with two invited contributions were carefully reviewed and selected from 30 submissions. The conference was devoted to Internet computing and modeling, grid computing, peer-to-peer systems, and cluster computing. Among the issues addressed are scalable infrastructure for global data grids, distributed checkpointing, list coloring, parallel debugging, combinatorial optimization, video on demand servers, caching, grid environments, network enabled servers, multicast communication, dynamic resource allocation, traffic engineering, path-vector protocols, Web-based Internet broadcasting, Web-based middleware, and subscription-based Internet services.




Formal Methods for Distributed System Development


Book Description

th The 20 anniversary of the IFIP WG6. 1 Joint International Conference on Fonna! Methods for Distributed Systems and Communication Protocols (FORTE XIII / PSTV XX) was celebrated by the year 2000 edition of the Conference, which was held for the first time in Italy, at Pisa, October 10-13, 2000. In devising the subtitle for this special edition --'Fonna! Methods Implementation Under Test' --we wanted to convey two main concepts that, in our opinion, are reflected in the contents of this book. First, the early, pioneering phases in the development of Formal Methods (FM's), with their conflicts between evangelistic and agnostic attitudes, with their over optimistic applications to toy examples and over-skeptical views about scalability to industrial cases, with their misconceptions and myths . . . , all this is essentially over. Many FM's have successfully reached their maturity, having been 'implemented' into concrete development practice: a number of papers in this book report about successful experiences in specifYing and verifYing real distributed systems and protocols. Second, one of the several myths about FM's - the fact that their adoption would eventually eliminate the need for testing - is still quite far from becoming a reality, and, again, this book indicates that testing theory and applications are still remarkably healthy. A total of 63 papers have been submitted to FORTEIPSTV 2000, out of which the Programme Committee has selected 22 for presentation at the Conference and inclusion in the Proceedings.




Foundations of Security Analysis and Design


Book Description

Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).




Advances in Computing Science - ASIAN 2000


Book Description

The Asian Computing Science Conference (ASIAN) series was initiated in 1995 to provide a forum for researchers in computer science in Asia to meet and to promote interaction with researchers from other regions. The previous ?ve conferences were held, respectively, in Bangkok, Singapore, Kathmandu, Manila, and Phuket. The proceedings were published in the Lecture Notes in Computer Science Series of Springer-Verlag. This year’s conference (ASIAN2000) attracted 61 submissions from which 18 papers were selected through an electronic program committee (PC) meeting. The themes for this year’s conference are: – Logics in Computer Science – Data Mining – Networks and Performance The key note speaker for ASIAN2000 is Jean Vuillemin (ENS, France) and the invited speakers are Ramamohanarao Kotagiri (U. Melbourne, Australia) and Alain Jean-Marie (LIRMM, France). We thank them for accepting our - vitation. This year’s conference is sponsored by the Asian Institute of Technology (Thailand), INRIA (France), the National University of Singapore (Singapore), and UNU/IIST (Macau SAR, China). We thank all these institutions for their continued support of the ASIAN series. This year’s conference will be held in Penang, Malaysia. We are much obliged to Universiti Sains Malaysia and Penang State Government for providing the conference venue and to Dr. Abdullah Zawawi Haji Talib for making the local arrangements. We also wish to thank the PC members and the large number of referees for thesubstantialworkputinbytheminassessingthesubmittedpapers.




Software Process Technology


Book Description

This book constitutes the refereed proceedings of the 7th European Workshop on Software Process Technology, EWSPT 2000, held in Kaprun, Austria in February 2000 in conjunction with a meeting of the European ESPRIT IV Project for Process Instance Evolution (PIE). The 21 revised papers presented were carefully reviewed and selected from 44 submissions. The book is organized in sections on methods, applications, process instance evolution, distributed processes and process modeling languages, and industrial experience.