58 results on '"A.W. Roscoe"'
Search Results
2. Characterisations of simply−connected finite polyhedra in 3−space
3. Formal Verification of Arbitrary Network Topologies
4. Denotational semantics for occam2‚ Part 2
5. On transition systems and non−well−founded sets
6. Authentication in pervasive computing
7. The automated verification of timewise refinement
8. On Model Checking Data−independent Systems with Arrays without Reset
9. Denotational semantics for occam2‚ Part 1
10. Using CSP to Detect Errors in the TMN Protocol
11. Model checking cryptographic protocols subject to combinatorial attack
12. Bootstrapping Multi−Party Ad−Hoc Security
13. Local search in model checking
14. Continuous analogues of axiomatised digital surfaces
15. Timed CSP: theory and practice
16. SVA‚ a tool for analysing shared−variable programms
17. TTP: A case study in combining induction and data independence
18. Reverse authentication in financial transactions
19. A Case Study of the Formal Specification of a Parallel System using CSP
20. Internalising Agents in CSP Protocol Models
21. Concepts of digital topology
22. Machine−Verifiable Responsiveness
23. Secure mobile ad−hoc interactions: reasoning about out−of−band (oob) channels
24. A semantic model for occam II
25. Research directions for trust and security in human−centric computing
26. Capturing parallel attacks within the data independence framework
27. Laws of Occam Programming
28. Communication and correctness in Timed CSP
29. User interactive Internet of things privacy preserved access control
30. Bootstrapping body sensor networks using human controlled LED−camera channels
31. Unbounded nondeterminism in CSP
32. Efficient group authentication protocols based on human interaction
33. SAT-solving in CSP trace refinement
34. FDR into The Cloud
35. On Transition Systems and Non-well-founded Sets
36. Reverse authentication in financial transactions and identity management
37. A Static Analysis Framework for Livelock Freedom in CSP
38. On the expressiveness of CSP
39. The missing link: Human Interactive Security Protocols in mobile payment
40. CSP is expressive enough for pi
41. Faster FDR Counterexample Generation Using SAT−Solving
42. Reflections on the Work of C.A.R. Hoare
43. Understanding Concurrent Systems
44. Bootstrapping multi−party ad−hoc security
45. A Classical Mind: essays in Honour of C.A.R. Hoare
46. Relational Program Derivation and Context−Free Language Recognition
47. Analysing TM_FS: a study of nondeterminism in real−time concurrency
48. Topology and category theory in computer science
49. On the expressive power of CSP refinement.
50. Continuous analogs of axiomatized digital surfaces
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.