Results 1  10
of
1,304,415
Expressiveness of the piCalculus and the $Calculus
"... Abstract: In this paper we investigate the expressiveness of two process algebras, the picalculus of mobile processes and the $calculus of bounded rational agents. We demonstrate that both models are more expressive than Turing Machines, i.e., they belong to superTuring models of computation. In ..."
Abstract
 Add to MetaCart
Abstract: In this paper we investigate the expressiveness of two process algebras, the picalculus of mobile processes and the $calculus of bounded rational agents. We demonstrate that both models are more expressive than Turing Machines, i.e., they belong to superTuring models of computation
Asynchrony and the PiCalculus
, 1992
"... We introduce an asynchronous version of Milner's ßcalculus, based on the idea that the messages are elementary processes that can be sent without any sequencing constraint. We show that this simple message passing discipline, together with the restriction construct making a name private for an ..."
Abstract

Cited by 43 (0 self)
 Add to MetaCart
We introduce an asynchronous version of Milner's ßcalculus, based on the idea that the messages are elementary processes that can be sent without any sequencing constraint. We show that this simple message passing discipline, together with the restriction construct making a name private
The Polymorphic Picalculus: Theory and Implementation
, 1995
"... We investigate whether the πcalculus is able to serve as a good foundation for the design and implementation of a stronglytyped concurrent programming language. The first half of the dissertation examines whether the πcalculus supports a simple type system which is flexible enough to provide a su ..."
Abstract

Cited by 112 (0 self)
 Add to MetaCart
. Higherorder polymorphism is important, since it gives us the ability to implement abstract datatypes in a typesafe manner, thereby providing a greater degree of modularity for πcalculus programs. The functional computational paradigm plays an important part in many programming languages. It is well
Presheaf Models for the piCalculus
, 1997
"... Recent work has shown that presheaf categories provide a general model of concurrency, with an inbuilt notion of bisimulation based on open maps. Here it is shown how this approach can also handle systems where the language of actions may change dynamically as a process evolves. The example is the p ..."
Abstract

Cited by 19 (4 self)
 Add to MetaCart
that bisimulation in the model, obtained from open maps, coincides with the usual bisimulation obtained from the operational semantics of the picalculus. While attention is concentrated on the `late' semantics of the picalculus, it is indicated how the `early' and other variants can also be captured.
Computational secrecy by typing for the picalculus
 In Proc. ASIAN Symp. on Programming Languages and Systems
, 2006
"... Abstract. We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal secrecy properties. We show that those secrecy properties have counterparts in the implementation, not formally ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
Abstract. We define and study a distributed cryptographic implementation for an asynchronous pi calculus. At the source level, we adapt simple type systems designed for establishing formal secrecy properties. We show that those secrecy properties have counterparts in the implementation
HumanComputer Interaction
, 1993
"... www.bcshci.org.uk Find out what happened at HCI2004 Interacting with … music aeroplanes petrol pumps Published by the British HCI Group • ISSN 1351119X 1 ..."
Abstract

Cited by 582 (18 self)
 Add to MetaCart
www.bcshci.org.uk Find out what happened at HCI2004 Interacting with … music aeroplanes petrol pumps Published by the British HCI Group • ISSN 1351119X 1
On Differential Interaction Nets and the Picalculus
 Preuves, Programmes et Systèmes
, 2006
"... We propose a translation of a finitary (that is, replicationfree) version of the picalculus into promotionfree differential interaction net structures, a linear logic version of the differential lambdacalculus (or, more precisely, of a resource lambdacalculus). For the sake of simplicity only, w ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
We propose a translation of a finitary (that is, replicationfree) version of the picalculus into promotionfree differential interaction net structures, a linear logic version of the differential lambdacalculus (or, more precisely, of a resource lambdacalculus). For the sake of simplicity only
A calculus for cryptographic protocols: The spi calculus
 Information and Computation
, 1999
"... We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols; the ..."
Abstract

Cited by 919 (55 self)
 Add to MetaCart
We introduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for studying authentication protocols. The pi calculus (without extension) suffices for some abstract protocols
Information Flow vs. Resource Access in the Asynchronous PiCalculus (Extended Abstract)
, 2000
"... ) Matthew Hennessy 1 and James Riely 2 1 COGS, University of Sussex, UK email:matthewh@cogs.sussex.ac.uk, home page: http://www.cogs.susx.ac.uk/users/matthewh/ 2 DePaul University, US email:jriley@cs.depaul.edu home page: http://www.depaul.edu/ jriely/ Abstract. We propose an extension ..."
Abstract

Cited by 78 (0 self)
 Add to MetaCart
of the asynchronous calculus in which a variety of security properties may be captured using types. These are an extension of the Input/Output types for the calculus in which I/O capabilities are assigned specific security levels. We define a typing system which ensures that processes running at security level
Results 1  10
of
1,304,415