The Pi-Calculus


Book Description

Graduate text on the p-calculus, a mathematical model of mobile computing systems.




Communicating and Mobile Systems


Book Description

First account of new theory of communication in computing which describes networks, as well as parts of computer systems.




Modeling and Verifying Security Protocols with the Applied Pi Calculus and Proverif


Book Description

This survey focuses on the verification of specifications of protocols in the symbolic model. Even though it is fairly abstract, this level of verification is relevant in practice as it enables the discovery of many attacks. ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic primitives.




Handbook of Process Algebra


Book Description

Process Algebra is a formal description technique for complex computer systems, especially those involving communicating, concurrently executing components. It is a subject that concurrently touches many topic areas of computer science and discrete math, including system design notations, logic, concurrency theory, specification and verification, operational semantics, algorithms, complexity theory, and, of course, algebra.This Handbook documents the fate of process algebra since its inception in the late 1970's to the present. It is intended to serve as a reference source for researchers, students, and system designers and engineers interested in either the theory of process algebra or in learning what process algebra brings to the table as a formal system description and verification technique. The Handbook is divided into six parts spanning a total of 19 self-contained Chapters. The organization is as follows. Part 1, consisting of four chapters, covers a broad swath of the basic theory of process algebra. Part 2 contains two chapters devoted to the sub-specialization of process algebra known as finite-state processes, while the three chapters of Part 3 look at infinite-state processes, value-passing processes and mobile processes in particular. Part 4, also three chapters in length, explores several extensions to process algebra including real-time, probability and priority. The four chapters of Part 5 examine non-interleaving process algebras, while Part 6's three chapters address process-algebra tools and applications.




A Distributed Pi-Calculus


Book Description

Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behaviour are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behaviour of mobile agents in a distributed world. It is based on an existing formal language, the pi-calculus, to which it adds a network layer and a primitive migration construct. A mathematical theory of the behaviour of these distributed systems is developed, in which the presence of types plays a major role. It is also shown how in principle this theory can be used to develop verification techniques for guaranteeing the behavior of distributed agents. The text is accessible to computer scientists with a minimal background in discrete mathematics. It contains an elementary account of the pi-calculus, and the associated theory of bisimulations. It also develops the type theory required by Dpi from first principles.




Excursions in Calculus


Book Description

This book explores the rich and elegant interplay between the two main currents of mathematics, the continuous and the discrete. Such fundamental notions in discrete mathematics as induction, recursion, combinatorics, number theory, discrete probability, and the algorithmic point of view as a unifying principle are continually explored as they interact with traditional calculus.




100 Years of Math Milestones: The Pi Mu Epsilon Centennial Collection


Book Description

This book is an outgrowth of a collection of 100 problems chosen to celebrate the 100th anniversary of the undergraduate math honor society Pi Mu Epsilon. Each chapter describes a problem or event, the progress made, and connections to entries from other years or other parts of mathematics. In places, some knowledge of analysis or algebra, number theory or probability will be helpful. Put together, these problems will be appealing and accessible to energetic and enthusiastic math majors and aficionados of all stripes. Stephan Ramon Garcia is WM Keck Distinguished Service Professor and professor of mathematics at Pomona College. He is the author of four books and over eighty research articles in operator theory, complex analysis, matrix analysis, number theory, discrete geometry, and other fields. He has coauthored dozens of articles with students, including one that appeared in The Best Writing on Mathematics: 2015. He is on the editorial boards of Notices of the AMS, Proceedings of the AMS, American Mathematical Monthly, Involve, and Annals of Functional Analysis. He received four NSF research grants as principal investigator and five teaching awards from three different institutions. He is a fellow of the American Mathematical Society and was the inaugural recipient of the Society's Dolciani Prize for Excellence in Research. Steven J. Miller is professor of mathematics at Williams College and a visiting assistant professor at Carnegie Mellon University. He has published five books and over one hundred research papers, most with students, in accounting, computer science, economics, geophysics, marketing, mathematics, operations research, physics, sabermetrics, and statistics. He has served on numerous editorial boards, including the Journal of Number Theory, Notices of the AMS, and the Pi Mu Epsilon Journal. He is active in enrichment and supplemental curricular initiatives for elementary and secondary mathematics, from the Teachers as Scholars Program and VCTAL (Value of Computational Thinking Across Grade Levels), to numerous math camps (the Eureka Program, HCSSiM, the Mathematics League International Summer Program, PROMYS, and the Ross Program). He is a fellow of the American Mathematical Society, an at-large senator for Phi Beta Kappa, and a member of the Mount Greylock Regional School Committee, where he sees firsthand the challenges of applying mathematics.




A History of Pi


Book Description

Traces the history of the mathematical constant pi from the stone age through the computer age, discussing the background of the times when pi progressed, and when it did not.




Logic and Algebra of Specification


Book Description

For some years, specification of software and hardware systems has been influenced not only by algebraic methods but also by new developments in logic. These new developments in logic are partly based on the use of algorithmic techniques in deduction and proving methods, but are alsodue to new theoretical advances, to a great extent stimulated by computer science, which have led to new types of logic and new logical calculi. The new techniques, methods and tools from logic, combined with algebra-based ones, offer very powerful and useful tools for the computer scientist, which may soon become practical for commercial use, where, in particular, more powerful specification tools are needed for concurrent and distributed systems. This volume contains papers based on lectures by leading researchers which were originally given at an international summer school held in Marktoberdorf in 1991. The papers aim to give a foundation for combining logic and algebra for the purposes of specification under the aspects of automated deduction, proving techniques, concurrency and logic, abstract data types and operational semantics, and constructive methods.




Foundations of Security Analysis and Design


Book Description

Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).