메뉴 건너뛰기




Volumn 2701, Issue , 2003, Pages 226-240

On a semantic definition of data independent

Author keywords

Data independence; Definability; Logical relations; Nondeterminism

Indexed keywords

BIOMINERALIZATION; SEMANTICS; SYNTACTICS;

EID: 35048893887     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44904-3_16     Document Type: Article
Times cited : (3)

References (23)
  • 1
    • 0002422649 scopus 로고
    • A characterization of lambda definability in categorical models of implicit polymorphism
    • M. Alimohamed. A characterization of lambda definability in categorical models of implicit polymorphism. Theoretical Computer Science, 146:5-23, 1995.
    • (1995) Theoretical Computer Science , vol.146 , pp. 5-23
    • Alimohamed, M.1
  • 2
    • 84887074204 scopus 로고    scopus 로고
    • First-order-CTL model checking
    • Foundations of Software Technology and Theoretical Computer Science (FST&TCS'98), Springer-Verlag
    • J. Bohn, W. Damm, O. Grumberg, H. Hungar, and K. Laster. First-order-CTL model checking. In Foundations of Software Technology and Theoretical Computer Science (FST&TCS'98), volume 1530 of Lecture Notes in Computer Science, pages 283-294. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1530 , pp. 283-294
    • Bohn, J.1    Damm, W.2    Grumberg, O.3    Hungar, H.4    Laster, K.5
  • 7
    • 84949199118 scopus 로고    scopus 로고
    • Lambda definability with sums via Grothendieck logical relations
    • Proceedings of the 4th International Conference on Typed Lambda Calculi and Applications (TLCA '99), Springer-Verlag
    • M. Fiore and A. Simpson. Lambda definability with sums via Grothendieck logical relations. In Proceedings of the 4th International Conference on Typed Lambda Calculi and Applications (TLCA '99), volume 1581 of Lecture Notes in Computer Science, pages 147-161. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1581 , pp. 147-161
    • Fiore, M.1    Simpson, A.2
  • 8
    • 1442333628 scopus 로고    scopus 로고
    • Logical relations for monadic types
    • Proceedings of the 11th Annual Conference of the European Association for Computer Science Logic (CSL'02), Springer-Verlag
    • J. Goubault-Larrecq, S. Lasota, and D. Nowak. Logical relations for monadic types. In Proceedings of the 11th Annual Conference of the European Association for Computer Science Logic (CSL'02), volume 2471 of Lecture Notes in Computer Science, pages 553-568. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2471 , pp. 553-568
    • Goubault-Larrecq, J.1    Lasota, S.2    Nowak, D.3
  • 11
    • 0348194684 scopus 로고    scopus 로고
    • A fully abstract semantics for a higher-order functional language with nondeterministic computation
    • A. Jeffrey. A fully abstract semantics for a higher-order functional language with nondeterministic computation. Theoretical Computer Science, 228:105-150, 1999.
    • (1999) Theoretical Computer Science , vol.228 , pp. 105-150
    • Jeffrey, A.1
  • 12
    • 0001128385 scopus 로고
    • Deciding bisimulation equivalences for a class of non-finite-state programs
    • B. Jonsson and J. Parrow. Deciding bisimulation equivalences for a class of non-finite-state programs. Information and Computation, 107(2):272-302, 1993.
    • (1993) Information and Computation , vol.107 , Issue.2 , pp. 272-302
    • Jonsson, B.1    Parrow, J.2
  • 13
    • 85028745708 scopus 로고
    • A new characterization of lambda definability
    • Proceedings of the 1st International Conference on Typed Lambda Calculi and Applications (TLCA'93), Springer-Verlag
    • A. Jung and J. Tiuryn. A new characterization of lambda definability. In Proceedings of the 1st International Conference on Typed Lambda Calculi and Applications (TLCA'93), volume 664 of Lecture Notes in Computer Science, pages 245-257. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.664 , pp. 245-257
    • Jung, A.1    Tiuryn, J.2
  • 15
    • 84885231540 scopus 로고    scopus 로고
    • A unifying approach to data-independence
    • Proceedings of the 11th International Conference on Concurrency Theory (CONCUR 2000), Springer-Verlag
    • R. Lazić and D. Nowak. A unifying approach to data-independence. In Proceedings of the 11th International Conference on Concurrency Theory (CONCUR 2000), volume 1877 of Lecture Notes in Computer Science, pages 581-595. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1877 , pp. 581-595
    • Lazić, R.1    Nowak, D.2
  • 16
    • 35248860481 scopus 로고    scopus 로고
    • Research report 392, Department of Computer Science, University of Warwick
    • R. Lazić and D. Nowak. On a semantic definition of data independence. Research report 392, Department of Computer Science, University of Warwick, 2003. http://www.dcs.warwick.ac.uk.
    • (2003) On a Semantic Definition of Data Independence
    • Lazić, R.1    Nowak, D.2
  • 17
    • 0022674022 scopus 로고
    • Non-deterministic data types: Models and implementations
    • T. Nipkow. Non-deterministic data types: models and implementations. Acta Informatica, 22(6):629-661, 1986.
    • (1986) Acta Informatica , vol.22 , Issue.6 , pp. 629-661
    • Nipkow, T.1
  • 20
    • 84947942515 scopus 로고
    • Automatic datapath abstraction in hardware systems
    • Proceedings of the 7th International Conference On Computer Aided Verification, Springer Verlag
    • R. Hojati and R. K. Brayton. Automatic datapath abstraction in hardware systems. In Proceedings of the 7th International Conference On Computer Aided Verification, volume 939 of Lecture Notes in Computer Science, pages 98-113. Springer Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.939 , pp. 98-113
    • Hojati, R.1    Brayton, R.K.2
  • 22
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • 11th IEEE Computer Security Foundations Workshop (CSFW11)
    • A. W. Roscoe and P. J. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal of Computer Security, Special Issue on the 11th IEEE Computer Security Foundations Workshop (CSFW11), pages 147-190, 1999.
    • (1999) Journal of Computer Security , Issue.SPEC. ISSUE , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.